Login / Signup
Securing a Deployment Pipeline.
Len Bass
Ralph Holz
Paul Rimba
An Binh Tran
Liming Zhu
Published in:
RELENG@ICSE (2015)
Keyphrases
</>
real time
data sets
information security
processing pipeline
real world
machine learning
e learning
website
trade off
probabilistic model
sensor networks
identity management
pipeline architecture