University of Idaho VIVO
Index
Log in
Search form
Home
Subjects
People
Organizations
Research
FAQs
Techniques to Model and Derive a Cyber-Attacker's Intelligence
Chapter
Overview
Overview
authors
Hale, John
Hamm, Jonathan
Haney, Michael
Hartney, Chris
Hawrylak, Peter
editors
Zurada, Jacek M
Igelnik, Boris
publication date
January 1, 2013
publisher
Information Science Reference
Publisher
published in
Efficiency and Scalability Methods for Computational Intellect
Book