Login / Signup
The utilization of trend analysis in the effective monitoring of information security. Part 2: the model.
Martin Botha
Rossouw von Solms
Published in:
Inf. Manag. Comput. Secur. (2002)
Keyphrases
</>
information security
databases
neural network
probabilistic model
information security management