Login / Signup
The Security Butterfly Effect.
Cat Okita
Published in:
LISA (2007)
Keyphrases
</>
information security
security issues
intrusion detection
information assurance
computer security
security policies
data mining
access control
database systems
statistical databases
security requirements
neural network
elliptic curve
security model
security systems
malware detection
security threats
data sets