Login / Signup
Remodelling the Attacker (Transcript of Discussion).
Bruce Christianson
Published in:
Security Protocols Workshop (2008)
Keyphrases
</>
database
real time
data mining
machine learning
information retrieval
multimedia
similarity measure
bayesian networks
literature review