Login / Signup
Defending against the Pirate Evolution Attack.
Hongxia Jin
Jeffrey B. Lotspiech
Published in:
ISPEC (2009)
Keyphrases
</>
ddos attacks
evolutionary algorithm
case study
secret key
malicious users
database
real time
neural network
machine learning
cooperative
temporal evolution
artificial life
dos attacks
evolution process
malicious attacks