Login / Signup

Refined game-theoretic approach to improve authenticity of outsourced databases.

Faryed EltayeshJamal BentaharRabeb MizouniHadi OtrokElhadi M. Shakshuki
Published in: J. Ambient Intell. Humaniz. Comput. (2017)
Keyphrases
  • real world
  • neural network
  • databases
  • digital images
  • data analysis
  • data sources
  • intrusion detection
  • dimension reduction