A. Alayed

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Addressing security vulnerabilities and system intrusions can represent a significant administrative overhead in current computer systems. Although technologies exist for both vulnerability scanning and for intrusion detection, the problems typically require some form of human intervention before they can be rectified. Evidence suggests that, in many cases,(More)
  • 1