Designing security scenarios for capturing suspicious activities - yes it's possible.

No ratings

Presented at Confidence 2016 by

N/A