Keyphrases
- countermeasures
- secret key
- neural network
- genetic programming
- key exchange protocol
- malicious users
- evolutionary approaches
- power analysis
- detection mechanism
- harmony search
- dos attacks
- artificial neural networks
- machine learning
- data mining
- cyber attacks
- information systems
- genetic algorithm
- denial of service attacks
- attack detection
- real time
- database