Cited By
View all- Wu SBanzhaf W(2010)ReviewApplied Soft Computing10.1016/j.asoc.2009.06.01910:1(1-35)Online publication date: 1-Jan-2010
- Diaz-Gomez PHougen D(2006)A Genetic Algorithm Approach for Doing Misuse Detection in Audit Trail FilesProceedings of the 15th International Conference on Computing10.1109/CIC.2006.6(329-338)Online publication date: 21-Nov-2006
- Karim A(2005)Computational intelligence for network intrusion detectionProceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I10.1007/11596448_25(170-175)Online publication date: 15-Dec-2005