Login / Signup
Open vs. closed: which source is more secure?
Richard Ford
Published in:
ACM Queue (2007)
Keyphrases
</>
closed world
databases
information systems
intrusion detection
case study
data streams
multiple sources
security requirements
scalar product