• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Securing a Deployment Pipeline.

Len BassRalph HolzPaul RimbaAn Binh TranLiming Zhu
Published in: RELENG@ICSE (2015)
Keyphrases
  • real time
  • data sets
  • information security
  • processing pipeline
  • real world
  • machine learning
  • e learning
  • website
  • trade off
  • probabilistic model
  • sensor networks
  • identity management
  • pipeline architecture