Login / Signup
Managing complex IT security processes with value based measures.
Robert K. Abercrombie
Frederick T. Sheldon
Ali Mili
Published in:
CICS (2009)
Keyphrases
</>
complex data
intrusion detection
real world
high level
higher level
security issues
service management
network security
complex systems
security vulnerabilities
physical processes
security model
computer networks
real time
database systems
neural network
data sets