Login / Signup

Anti-circumvention misuse.

Dan L. Burk
Published in: IEEE Technol. Soc. Mag. (2003)
Keyphrases
  • anomaly detection
  • security protection
  • intrusion detection system
  • personal data
  • database systems
  • countermeasures
  • real time
  • computer systems