Login / Signup
An overview of network evasion methods.
Brian Hernacki
Jeremy Bennett
James A. Hoagland
Published in:
Inf. Secur. Tech. Rep. (2005)
Keyphrases
</>
databases
database
data sets
information retrieval
artificial intelligence
face recognition
preprocessing
cross validation
qualitative and quantitative
optimization methods