Login / Signup

Why a counterfeit risk avoidance strategy fails.

Inez MiyamotoThomas H. HolzerShahryar Sarkani
Published in: Comput. Secur. (2017)
Keyphrases
  • evolutionary algorithm
  • risk management
  • image processing
  • selection strategy
  • high risk
  • data sets
  • machine learning
  • expert systems
  • mobile robot
  • risk assessment
  • expected utility