Login / Signup
How Effective Are the Prevailing Attack-Defense Models for Cybersecurity Anyway?
Daojing He
Sammy Chan
Yan Zhang
Chunming Wu
Bing Wang
Published in:
IEEE Intell. Syst. (2014)
Keyphrases
</>
decision making
high quality
intrusion detection
real time
neural network
prior knowledge