Return to Article Details Extracting classification rules from an informatic security incidents repository by genetic programming Download Download PDF