Login / Signup
An Approach to Analyzing the Windows and Linux Security Models.
Xinyue Song
Michael Stinson
Roger Y. Lee
Paul B. Albee
Published in:
ACIS-ICIS (2006)
Keyphrases
</>
intrusion detection
statistical models
probabilistic model
model selection
operating system
security issues
databases
bayesian networks
database applications
experimental data
computational models
malware detection
microsoft windows
windows xp