Login / Signup
Why a counterfeit risk avoidance strategy fails.
Inez Miyamoto
Thomas H. Holzer
Shahryar Sarkani
Published in:
Comput. Secur. (2017)
Keyphrases
</>
evolutionary algorithm
risk management
image processing
selection strategy
high risk
data sets
machine learning
expert systems
mobile robot
risk assessment
expected utility