Login / Signup

How Effective Are the Prevailing Attack-Defense Models for Cybersecurity Anyway?

Daojing HeSammy ChanYan ZhangChunming WuBing Wang
Published in: IEEE Intell. Syst. (2014)
Keyphrases
  • decision making
  • high quality
  • intrusion detection
  • real time
  • neural network
  • prior knowledge