Sign in

Immunity-Based Model for Malicious Code Detection.

Yu ZhangLihua WuFeng XiaXiaowen Liu
Published in: ICIC (1) (2010)
Keyphrases
  • risk assessment
  • anomaly detection
  • classification algorithm
  • bp neural network