Login / Signup
Computing counter-examples for privilege protection losses using security models.
Marc-André Laverdière
Ettore Merlo
Published in:
SANER (2017)
Keyphrases
</>
counter examples
information security
security policies
machine learning
probabilistic model
model selection
information systems
high level
access control
intrusion detection
orders of magnitude
network security
security issues
computer security
security architecture