Login / Signup
A Study and Implementation of Vulnerability Assessment and Misconfiguration Detection.
Ching-Huang Lin
Chih-Hao Chen
Chi-Sung Laih
Published in:
APSCC (2008)
Keyphrases
</>
neural network
data sets
empirical studies
detection algorithm
object detection
factors affecting
risk assessment
false alarms
automatic detection
simulation study
experimental study
object recognition
multimedia
social networks
data mining
real world
databases