Vulnerability Analysis and Evaluation within an Intranet.
Eung Ki ParkJung-Taek SeoEul-Gyu ImCheolwon LeePublished in: ISI (2004)
Keyphrases
- computer vision
- evaluation method
- computational complexity
- databases
- evaluation model
- evaluation criteria
- image processing
- information management
- evaluation framework
- database
- evaluation process
- xml retrieval
- gold standard
- evolutionary algorithm
- expert systems
- optimal solution
- information systems
- social networks
- artificial intelligence
- data mining
- neural network
- data sets