Login / Signup

Evolutionary Design of Attack Strategies.

Petr Svenda
Published in: Security Protocols Workshop (2009)
Keyphrases
  • evolutionary design
  • evolutionary computation
  • automated design
  • artificial intelligence
  • information technology
  • intrusion detection
  • online auctions
  • secret key