Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/ijcnn/StahlECZW10
%A Stahl, Bernd Carsten
%A Elizondo, David A.
%A Carroll-Mayer, Moira
%A Zheng, Yingqin
%A Wakunuma, Kutoma
%B IJCNN
%D 2010
%I IEEE
%K dblp
%P 1-8
%T Ethical and legal issues of the use of computational intelligence techniques in computer security and computer forensics.
%U http://dblp.uni-trier.de/db/conf/ijcnn/ijcnn2010.html#StahlECZW10
%@ 978-1-4244-6916-1
@inproceedings{conf/ijcnn/StahlECZW10,
added-at = {2012-04-24T00:00:00.000+0200},
author = {Stahl, Bernd Carsten and Elizondo, David A. and Carroll-Mayer, Moira and Zheng, Yingqin and Wakunuma, Kutoma},
biburl = {https://www.bibsonomy.org/bibtex/29f262a56729a36c362b494e935617d77/dblp},
booktitle = {IJCNN},
crossref = {conf/ijcnn/2010},
ee = {http://dx.doi.org/10.1109/IJCNN.2010.5596546},
interhash = {0b3b80dba2d38af28b1a3258e7fee7b2},
intrahash = {9f262a56729a36c362b494e935617d77},
isbn = {978-1-4244-6916-1},
keywords = {dblp},
pages = {1-8},
publisher = {IEEE},
timestamp = {2017-03-30T11:57:09.000+0200},
title = {Ethical and legal issues of the use of computational intelligence techniques in computer security and computer forensics.},
url = {http://dblp.uni-trier.de/db/conf/ijcnn/ijcnn2010.html#StahlECZW10},
year = 2010
}