Login / Signup
A Method for Describing Structure of System Security Based on Trust and Authentication.
Tsukasa Maeda
Masahito Kurihara
Published in:
ACIS-ICIS (2010)
Keyphrases
</>
high accuracy
detection method
significant improvement
cost function
probabilistic model
support vector machine
user authentication
preprocessing
security requirements