Login / Signup

The Design and Implementation of an Intrusion Tolerant System.

James C. ReynoldsJames E. JustEd LawsonLarry A. CloughRyan MaglichKarl N. Levitt
Published in: DSN (2002)
Keyphrases
  • case study
  • data mining
  • design process
  • decision making
  • database systems
  • knowledge based systems