|
|
|
Elena Fedorchenko, Evgenia Novikova and Anton Shulepov
In order to provide an accurate and timely response to different types of the attacks, intrusion and anomaly detection systems collect and analyze a lot of data that may include personal and other sensitive data. These systems could be considered a sourc...
ver más
|
|
|