JD Mireles,
E Ficke,
JH Cho… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In cyberspace, evolutionary strategies are commonly used by both attackers and defenders.
For example, an attacker's strategy often changes over the course of time, as new …