Sign in
Secure Scan Techniques: A Comparison.
David Hély
Frédéric Bancel
Marie-Lise Flottes
Bruno Rouzeyre
Published in:
IOLTS (2006)
Keyphrases
</>
data sets
neural network
information retrieval
case study
evolutionary algorithm
security issues
security requirements