|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
Information security
Databases
Risk assessment
Computer security
Mathematical optimization
Reflection
Detection and tracking algorithms