Login / Signup

SoTE: Strategy of Triple-E on solving Trojan defense in Cyber-crime cases.

Da-Yu KaoShiuh-Jeng WangFrank Fu-Yuan Huang
Published in: Comput. Law Secur. Rev. (2010)
Keyphrases
  • cyber crime
  • intrusion detection
  • network security
  • knowledge management