Login / Signup
Towards visualising security with arguments.
Stefano Bistarelli
Fabio Rossi
Francesco Santini
Carlo Taticchi
Published in:
CILC (2015)
Keyphrases
</>
security vulnerabilities
intrusion detection
security properties
database
real time
data sets
information systems
web services
database systems
case based reasoning
anomaly detection
electronic commerce
information security
network management
security threats