Login / Signup

Approach for identification and analysis of human vulnerabilities in protecting telecommunications infrastructure.

Anil Macwan
Published in: Bell Labs Tech. J. (2004)
Keyphrases
  • neural network
  • information systems
  • access control
  • lightweight
  • human experts
  • quantitative analysis
  • automatic identification