Login / Signup
Assuring Compliance with Protection Profiles with ThreatGet.
Magdy El Sadany
Christoph Schmittner
Wolfgang Kastner
Published in:
SAFECOMP Workshops (2019)
Keyphrases
</>
data protection
user profiles
data sets
databases
similarity measure
learning environment
privacy protection
critical infrastructure
protection scheme