Login / Signup
Securing IS assets through hacker deterrence: A case study.
Sean M. Zadig
Gurvirender P. Tejay
Published in:
eCrime (2010)
Keyphrases
</>
countermeasures
case study
test bed
information security
network security
machine learning
knowledge base
feature extraction
trade off