Login / Signup
A Taxonomy of Approaches for Integrating Attack Awareness in Applications.
Tolga Ünlü
Lynsay A. Shepherd
Natalie Coull
Colin McLean
Published in:
Cyber Security (2020)
Keyphrases
</>
strengths and weaknesses
real world
search algorithm
neural network
database systems
databases
machine learning
artificial intelligence
decision trees
image segmentation