Login / Signup
Writing requirements in computer security.
Stefan A. Robila
Carl Bredlau
Published in:
SIGITE Conference (2005)
Keyphrases
</>
computer security
computer systems
anomaly detection
information security
intrusion detection
network intrusion detection
network security
intrusion detection system
database
metadata
decision trees
bayesian networks
unsupervised learning