Login / Signup
Applying PII fingerprints in security incident analysis.
Andrew Padilla
Martin A. Oberhofer
Ivan Milman
Published in:
AMCIS (2012)
Keyphrases
</>
image analysis
quantitative analysis
real time
database systems
statistical analysis
security requirements
forensic analysis
database
databases
learning algorithm
social networks
distributed systems
security issues