Login / Signup
Towards Requirement and Modeling Driven Security Evaluation.
Reijo Savola
Published in:
ICSNC (2006)
Keyphrases
</>
access control
information security
network security
neural network
data driven
intrusion detection
security issues
databases
data mining
information systems
control system
security mechanisms
key management