Sign in

Malicious IT - Guest Editors' Introduction.

Jeffrey M. VoasNancy R. Mead
Published in: IEEE Softw. (2000)
Keyphrases
  • special issue
  • virtual machine
  • detect malicious
  • artificial intelligence
  • database
  • data mining
  • genetic algorithm
  • information systems
  • case study
  • high level
  • data streams
  • expert systems
  • malicious behavior