Login / Signup
An Approach to Implementing Maturity Models in IT Security.
Vasant Rao
Rodger Jamieson
Published in:
ACIS (2003)
Keyphrases
</>
computational models
database
decision trees
intrusion detection
statistical model
databases
database systems
statistical models
functional requirements