Identifying vulnerabilities and critical requirements using criminal court proceedings.
Travis D. BreauxJonathan D. LewisPaul N. OttoAnnie I. AntónPublished in: SAC (2009)
Keyphrases
- international conference
- advances in artificial intelligence
- international symposium
- international workshop
- information security
- working conference
- international conference on machine learning
- intelligence and security informatics
- conference on artificial intelligence
- proceedings of the th international conference
- computer personnel
- pacific rim
- application specific
- countermeasures
- security vulnerabilities
- australasian database conference
- workshop on artificial intelligence
- functional requirements
- information retrieval
- law enforcement
- lecture notes
- information sharing
- social network analysis
- cloud computing
- computational intelligence
- case study