Login / Signup
Policy and implementation of an adaptive firewall.
Theuns Verwoerd
Ray Hunt
Published in:
ICON (2002)
Keyphrases
</>
network security
databases
data mining
genetic algorithm
multiscale
reinforcement learning
efficient implementation
implementation details
implementation issues
security enforcement