Login / Signup
Study on the modeling and analyzing of the role-based threats in the cyberspace.
Yeli Hao
Shize Guo
Hong Zhao
Zhe Chen
Published in:
CCIS (2012)
Keyphrases
</>
data mining
empirical studies
statistical analysis
database
real time
data sets
search engine
multiscale
experimental study