|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
Information security
Biology
Fuzzy logic
Cognitive modeling
Computer security
Data acquisition
Data modeling