A BM Algorithm Oriented on Network Security Audit System


this paper combines the characteristics of network security audit system and improves the original BM algorithm and makes it suitable for the use of network security audit system. New BMLA algorithm combines some of the strengths of BM Algorithm. In the matching process, it Not only generate greater jumping distance , but also Increases the probability of… (More)


Figures and Tables

Sorry, we couldn't extract any figures or tables for this paper.

Slides referencing similar topics