Login / Signup

A Method for Describing Structure of System Security Based on Trust and Authentication.

Tsukasa MaedaMasahito Kurihara
Published in: ACIS-ICIS (2010)
Keyphrases
  • high accuracy
  • detection method
  • significant improvement
  • cost function
  • probabilistic model
  • support vector machine
  • user authentication
  • preprocessing
  • security requirements