Login / Signup
Matching Procedure for NVD Vulnerabilities to Secure ETL Processes Steps.
Salma Dammak
Faiza Ghozzi
Faïez Gargouri
Published in:
AICCSA (2017)
Keyphrases
</>
matching procedure
matching process
security issues
security mechanisms
data warehouse
business intelligence
security patterns
information security
similarity measure
security requirements
computer vision
image processing
feature vectors
video data