Sign in

Design and Implementation of Unauthorized Access Tracing System.

Shigeyuki MatsudaTatsuya BabaAkihiro HayakawaTaichi Nakamura
Published in: SAINT (2002)
Keyphrases
  • database systems
  • unauthorized access
  • databases
  • object recognition
  • knowledge discovery
  • nearest neighbor
  • design process
  • computer networks