Login / Signup
Exploit hijacking: side effects of smart defenses.
Costin Raiciu
Mark Handley
David S. Rosenblum
Published in:
LSAD@SIGCOMM (2006)
Keyphrases
</>
genetic algorithm
computer based instruction
data sets
machine learning
artificial intelligence
anomaly detection
machine learning systems