Login / Signup
Malicious IT - Guest Editors' Introduction.
Jeffrey M. Voas
Nancy R. Mead
Published in:
IEEE Softw. (2000)
Keyphrases
</>
special issue
virtual machine
detect malicious
artificial intelligence
database
data mining
genetic algorithm
information systems
case study
high level
data streams
expert systems
malicious behavior