Login / Signup
A Comparison between Two Approaches to Threat Evaluation in an Air Defense Scenario.
Fredrik Johansson
Göran Falkman
Published in:
MDAI (2008)
Keyphrases
</>
image processing
website
strengths and weaknesses
evaluation methods
evaluation model
alternative approaches
databases
real world
data mining
web pages
case study
data structure
intrusion detection
evaluation measures
evaluation framework
comprehensive evaluation