Login / Signup

A Taxonomy of Approaches for Integrating Attack Awareness in Applications.

Tolga ÜnlüLynsay A. ShepherdNatalie CoullColin McLean
Published in: Cyber Security (2020)
Keyphrases
  • strengths and weaknesses
  • real world
  • search algorithm
  • neural network
  • database systems
  • databases
  • machine learning
  • artificial intelligence
  • decision trees
  • image segmentation