Login / Signup
Use-case-specific metrics for comparative testing of endpoint security products.
Jeffrey Wu
Anthony Arrott
Published in:
MALWARE (2013)
Keyphrases
</>
network security
object oriented
domain specific
intrusion detection
information security
endpoints
comparative analysis
security analysis
security problems
data mining
access control
test cases
functional requirements
security systems