Login / Signup
Towards a security and privacy co-creation method.
Christophe Feltus
Erik H. A. Proper
Published in:
ICITST (2017)
Keyphrases
</>
support vector machine
detection method
preprocessing
data sets
genetic algorithm
image sequences
pairwise
significant improvement
high accuracy
neural network
clustering method
information loss
statistical databases
key management
security concerns