Sign in

The utilization of trend analysis in the effective monitoring of information security. Part 2: the model.

Martin BothaRossouw von Solms
Published in: Inf. Manag. Comput. Secur. (2002)
Keyphrases
  • information security
  • databases
  • neural network
  • probabilistic model
  • information security management