|
Volumn 49, Issue 1, 2006, Pages 37-39
|
How to think about security failures
|
Author keywords
[No Author keywords available]
|
Indexed keywords
ASSUMPTIONS;
ATTACKERS;
SECURITY MODELS;
TECHNOLOGICAL SOLUTIONS;
COMPUTATIONAL COMPLEXITY;
COMPUTER CRIME;
DATA ACQUISITION;
FEEDBACK;
MATHEMATICAL MODELS;
PATTERN RECOGNITION SYSTEMS;
PROBLEM SOLVING;
REAL TIME SYSTEMS;
SECURITY OF DATA;
|
EID: 33745183747
PISSN: 00010782
EISSN: 00010782
Source Type: Journal
DOI: 10.1145/1107458.1107482 Document Type: Review |
Times cited : (9)
|
References (4)
|