default search action
"Intelligence Techniques in Computer Security and Forensics: At the ..."
Bernd Carsten Stahl et al. (2012)
- Bernd Carsten Stahl, Moira Carroll-Mayer, David A. Elizondo, Kutoma Wakunuma, Yingqin Zheng:
Intelligence Techniques in Computer Security and Forensics: At the Boundaries of Ethics and Law. Computational Intelligence for Privacy and Security 2012: 237-258
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.