Sign in

Modeling Security-Check Queues.

Zhe George ZhangHsing Paul LuhChia-Hung Wang
Published in: Manag. Sci. (2011)
Keyphrases
  • neural network
  • information security
  • access control
  • intrusion detection
  • security policies
  • database
  • security requirements
  • computer security
  • malware detection
  • waiting times
  • retrial queue