Login / Signup
Using the Private-Internet-Enterprise (PIE) Model to Examine IT Risks and Threats Due to Porous Perimeters.
Brett J. L. Landry
M. Scott Koger
Sandra Blanke
Christian Nielsen
Published in:
Inf. Secur. J. A Glob. Perspect. (2009)
Keyphrases
</>
probabilistic model
prior knowledge
computational model
data sets
neural network
decision trees
mathematical model
statistical model
decision making
case study
high level
similarity measure
theoretical framework
conceptual model
security issues