Cited By
View all- Kayode ABabatunde IHaruna Danjuma Israel (2013)DGM approach to network attacker and defender strategies8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)10.1109/ICITST.2013.6750213(313-320)Online publication date: Dec-2013
- Khanna RLiu HChen H(2009)Reduced complexity intrusion detection in sensor networks using genetic algorithmProceedings of the 2009 IEEE international conference on Communications10.5555/1817271.1817383(598-602)Online publication date: 14-Jun-2009