Login / Signup
Approaches to handling "Trojan Horse" threats.
Yeheskel Lapid
Niv Ahituv
Seev Neumann
Published in:
Comput. Secur. (1986)
Keyphrases
</>
strengths and weaknesses
countermeasures
database
information retrieval
learning algorithm
artificial intelligence
optimal solution
evolutionary algorithm
information sharing
alternative approaches