Login / Signup
Computer-based methods for assessing information security competencies.
Z. Deljkic
Predrag Pale
Juraj Petrovic
Published in:
MIPRO (2019)
Keyphrases
</>
information security
object recognition
countermeasures
databases
data analysis
information technology
intrusion detection
risk analysis