Login / Signup

Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers.

Gerry V. DozierDouglas BrownHaiyu HouJohn Hurley
Published in: Appl. Soft Comput. (2007)
Keyphrases