Login / Signup

Potential applications of knowledge-based methods to computer security.

Rita C. SummersStanley A. Kurzban
Published in: Comput. Secur. (1988)
Keyphrases
  • computer security
  • databases
  • information technology
  • benchmark datasets
  • clustering algorithm
  • image segmentation
  • data analysis
  • active learning
  • computer systems