Login / Signup
Spy vs. Spy: counter-intelligence methods for backtracking malicious intrusions.
Jason S. Alexander
Thomas R. Dean
Scott Knight
Published in:
CASCON (2011)
Keyphrases
</>
machine learning methods
preprocessing
machine learning
artificial intelligence
benchmark datasets
search engine
reinforcement learning
expert systems
email
significant improvement