Login / Signup
Computer Security, Part 2.
Jeffrey R. Yost
Published in:
IEEE Ann. Hist. Comput. (2016)
Keyphrases
</>
computer security
computer systems
anomaly detection
information security
intrusion detection
network security
intrusion detection system
network intrusion detection
data mining
database systems
real world
smart card
information retrieval
data processing
data sets
text categorization
databases