Sign in

Remodelling the Attacker (Transcript of Discussion).

Bruce Christianson
Published in: Security Protocols Workshop (2008)
Keyphrases
  • database
  • real time
  • data mining
  • machine learning
  • information retrieval
  • multimedia
  • similarity measure
  • bayesian networks
  • literature review