Login / Signup

Computer-based methods for assessing information security competencies.

Z. DeljkicPredrag PaleJuraj Petrovic
Published in: MIPRO (2019)
Keyphrases
  • information security
  • object recognition
  • countermeasures
  • databases
  • data analysis
  • information technology
  • intrusion detection
  • risk analysis