Login / Signup
A framework for information security evaluation.
Rossouw von Solms
Helen van de Haar
Sebastiaan H. von Solms
William J. Caelli
Published in:
Inf. Manag. (1994)
Keyphrases
</>
information security
countermeasures
information systems
machine learning
training data
probabilistic model
low cost
design theory
security issues
information assurance
real world
information security management
security level
network security
data acquisition
dimensionality reduction
object recognition