Login / Signup
Protection systems and protection implementations.
Roger M. Needham
Published in:
AFIPS Fall Joint Computing Conference (1) (1972)
Keyphrases
</>
critical infrastructure
protection scheme
databases
management system
data protection
computational intelligence
intelligent systems
learning systems
database
real time
social networks
case study
knowledge based systems
information security