Login / Signup

Approaches to handling "Trojan Horse" threats.

Yeheskel LapidNiv AhituvSeev Neumann
Published in: Comput. Secur. (1986)
Keyphrases
  • strengths and weaknesses
  • countermeasures
  • database
  • information retrieval
  • learning algorithm
  • artificial intelligence
  • optimal solution
  • evolutionary algorithm
  • information sharing
  • alternative approaches