Login / Signup
Approach for identification and analysis of human vulnerabilities in protecting telecommunications infrastructure.
Anil Macwan
Published in:
Bell Labs Tech. J. (2004)
Keyphrases
</>
neural network
information systems
access control
lightweight
human experts
quantitative analysis
automatic identification