Login / Signup
Evaluating geographic topological vulnerabilities.
Xuelian Long
David Tipper
Teresa Gomes
Published in:
ICUMT (2013)
Keyphrases
</>
security vulnerabilities
decision trees
information security
topological properties
topological spaces
data sets
machine learning
social networks
image sequences
multiscale
topology preserving