Sign in
Approaches to Modelling Security Scenarios with Domain-Specific Languages.
Phillip J. Brooke
Richard F. Paige
Christopher Power
Published in:
Security Protocols Workshop (2012)
Keyphrases
</>
real world
training data
programming language
computer security
neural network
website
training set
network security
strengths and weaknesses