Login / Signup
Hunting Trojan Horses.
Micha Moffie
Winnie Cheng
David R. Kaeli
Qin Zhao
Published in:
ASID (2006)
Keyphrases
</>
terrorist activities
previously unknown
national security
homeland security
database
terrorist networks
correlation analysis
databases
bayesian networks
law enforcement
public health
causal relationships
information management
object oriented
data model
data mining
real time