Login / Signup

Policy and implementation of an adaptive firewall.

Theuns VerwoerdRay Hunt
Published in: ICON (2002)
Keyphrases
  • network security
  • databases
  • data mining
  • genetic algorithm
  • multiscale
  • reinforcement learning
  • efficient implementation
  • implementation details
  • implementation issues
  • security enforcement