Login / Signup
Cyberdefense When Attackers Mimic Legitimate Users: A Bayesian Approach.
Atin Basuchoudhary
Mohamed Eltoweissy
Mohamed Azab
Laura Razzolini
Shimaa Mohamed
Published in:
IRI (2015)
Keyphrases
</>
visualization tool
email
website
databases
genetic algorithm
recommender systems
collaborative filtering