Inproceedings,

Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing.

, , , and .
CISDA, page 1-8. IEEE, (2009)

Meta data

Tags

Users

  • @dblp

Comments and Reviews