Sign in

Secure Scan Techniques: A Comparison.

David HélyFrédéric BancelMarie-Lise FlottesBruno Rouzeyre
Published in: IOLTS (2006)
Keyphrases
  • data sets
  • neural network
  • information retrieval
  • case study
  • evolutionary algorithm
  • security issues
  • security requirements