1
Published 2013
Table of Contents: ... -- Intrusion Detection in Zero Knowledge System Using Model Checking Approach -- Detecting Malicious users in P...
View full text
Electronic eBook