Login / Signup

Are We Designing Cybersecurity to Protect People from Malicious Actors?

Alex Cadzow
Published in: IHSED (2018)
Keyphrases
  • social networks
  • real time
  • machine learning and data mining
  • genetic algorithm
  • social media
  • privacy protection
  • malicious attacks
  • data encryption