|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 67 scholarly publications.
Fuzzy logic
Computer intrusion detection
Computing systems
Binary data
Computer security
Network security
Computer networks