Login / Signup
Research on the Application Security Isolation Model.
Lei Gong
Yong Zhao
Jianhua Liao
Published in:
e-Forensics (2010)
Keyphrases
</>
probabilistic model
computational model
formal model
high level
network security
statistical model
mathematical model
data sets
theoretical analysis
conceptual model
process model
parameter estimation
markov chain
probability distribution
cost function
objective function
case study
decision trees