Academia.eduAcademia.edu

Table 3: Performance of GP and GE techniques on intrusion detection

Table 3 Performance of GP and GE techniques on intrusion detection