Login / Signup

Evaluating geographic topological vulnerabilities.

Xuelian LongDavid TipperTeresa Gomes
Published in: ICUMT (2013)
Keyphrases
  • security vulnerabilities
  • decision trees
  • information security
  • topological properties
  • topological spaces
  • data sets
  • machine learning
  • social networks
  • image sequences
  • multiscale
  • topology preserving