Login / Signup
Predation and the cost of replication: New approaches to malware prevention?
Richard Ford
Mark Bush
Alexander Bulatov
Published in:
Comput. Secur. (2006)
Keyphrases
</>
object oriented
strengths and weaknesses
real time
neural network
information retrieval
knowledge base
decision trees
data structure
communication cost
alternative approaches