|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
Neural networks
Computer intrusion detection
Data modeling
Binary data
Feature extraction
Neurons
Information security