Login / Signup

Predation and the cost of replication: New approaches to malware prevention?

Richard FordMark BushAlexander Bulatov
Published in: Comput. Secur. (2006)
Keyphrases
  • object oriented
  • strengths and weaknesses
  • real time
  • neural network
  • information retrieval
  • knowledge base
  • decision trees
  • data structure
  • communication cost
  • alternative approaches