Cited By
View all- Amro SElizondo DSolanas AMartínez-Ballesté A(2012)Evolutionary Computation in Computer Security and Forensics: An OverviewComputational Intelligence for Privacy and Security10.1007/978-3-642-25237-2_3(25-34)Online publication date: 10-Jan-2012
- O'Connor TSangster BWetzel SNita-Rotaru CStajano F(2010)honeyMProceedings of the third ACM conference on Wireless network security10.1145/1741866.1741888(129-138)Online publication date: 22-Mar-2010
- Wu SBanzhaf W(2010)ReviewApplied Soft Computing10.1016/j.asoc.2009.06.01910:1(1-35)Online publication date: 1-Jan-2010
- Show More Cited By