Login / Signup
An analysis of Fedora security profile.
Shweta Subramani
Mladen A. Vouk
Laurie A. Williams
Published in:
HotSoS (2014)
Keyphrases
</>
real time
machine learning
image analysis
neural network
statistical analysis
intrusion detection
data mining
learning algorithm
artificial intelligence
information systems
data analysis
user profiles
security requirements
risk analysis