Login / Signup
Adversarial co-evolution of attack and defense in a segmented computer network environment.
Erik Hemberg
Joseph R. Zipkin
Richard William Skowyra
Neal Wagner
Una-May O'Reilly
Published in:
GECCO (Companion) (2018)
Keyphrases
</>
computer networks
network security
real time
intrusion detection system
intrusion detection
computer network security
multi agent
defense mechanisms
computer systems
anomaly detection
mobile robot
network management
active learning
network traffic
web services
ddos attacks
tcp ip
computer networking
machine learning