Login / Signup

Exploit hijacking: side effects of smart defenses.

Costin RaiciuMark HandleyDavid S. Rosenblum
Published in: LSAD@SIGCOMM (2006)
Keyphrases
  • genetic algorithm
  • computer based instruction
  • data sets
  • machine learning
  • artificial intelligence
  • anomaly detection
  • machine learning systems