Login / Signup

An overview of network evasion methods.

Brian HernackiJeremy BennettJames A. Hoagland
Published in: Inf. Secur. Tech. Rep. (2005)
Keyphrases
  • databases
  • database
  • data sets
  • information retrieval
  • artificial intelligence
  • face recognition
  • preprocessing
  • cross validation
  • qualitative and quantitative
  • optimization methods