Login / Signup
Differentially secure multicasting and its implementation methods.
S. Holeman
G. Manimaran
James Davis
Anirban Chakrabarti
Published in:
Comput. Secur. (2002)
Keyphrases
</>
preprocessing
data mining
computational cost
empirical studies
benchmark datasets
real time
neural network
significant improvement
complexity analysis