Login / Signup
An implementation-independent threat model for group communications.
Jason Hester
William Yurcik
Roy H. Campbell
Published in:
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security (2006)
Keyphrases
</>
high level
experimental data
statistical model
computational model
management system
theoretical framework
group membership
linear model
network model
formal model
reinforcement learning
data sets
mathematical model
image sequences
database systems
prediction model
information retrieval
autoregressive
real time