-
4
-
-
0004074812
-
-
Kaufmann Publishers
-
Koza, J., Bennett, F., Andre, D., Keane, M.: Genetic programming III: Darwinian invention and problem solving. Kaufmann Publishers (1999)
-
(1999)
Genetic Programming III: Darwinian Invention and Problem Solving
-
-
Koza, J.1
Bennett, F.2
Andre, D.3
Keane, M.4
-
5
-
-
77952042681
-
Expert evolutionary computation in computer security and cryptography
-
Castro, J., Vinela, P.: Expert Evolutionary Computation in Computer Security and Cryptography. New Generation Computing Magazine 23(3), 193-199 (2005)
-
(2005)
New Generation Computing Magazine
, vol.23
, Issue.3
, pp. 193-199
-
-
Castro, J.1
Vinela, P.2
-
6
-
-
85047322127
-
An application of machine learning to network intrusion detection
-
IEEE, AZ
-
Sinclair, C., Pierce, L., Matzner, S.: An Application of Machine Learning to Network Intrusion Detection. In: Computer Phoenix, AZ, pp. 371-377. IEEE, AZ (1999)
-
(1999)
Computer Phoenix, AZ
, pp. 371-377
-
-
Sinclair, C.1
Pierce, L.2
Matzner, S.3
-
9
-
-
33646851992
-
A software implementation of a genetic algorithm based approach to network intrusion detection
-
DOI 10.1109/SNPD-SAWN.2005.9, 1434896, Proceedings - Sixth Int. Conf. on Softw. Eng., Artif. Intelligence, Networking and Parallel/Distributed Computing and First ACIS Int. Workshop on Self-Assembling Wireless Networks, SNPD/SAWN 2005
-
Gong, R., Zulkernine, M., Abolmaesumi, P.: 'A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection. In: Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks, pp. 246-253. IEEE, Washington, DC (2005) (Pubitemid 44499666)
-
(2005)
Proceedings - Sixth Int. Conf. on Softw. Eng., Artificial Intelligence, Netw. and Parallel/Distributed Computing and First ACIS Int. Workshop on Self-Assembling Wireless Netw., SNPD/SAWN 2005
, vol.2005
, pp. 246-253
-
-
Gong, R.H.1
Zulkernine, M.2
Abolmaesumi, P.3
-
10
-
-
28444477388
-
Intrusion detection based on clustering genetic algorithm
-
2005 International Conference on Machine Learning and Cybernetics, ICMLC 2005
-
Zhao, J.L., Zhao, J.F., Li, J.: Intrusion Detection based on Clustering Genetic Algorithms. Machine Learning and Cybernetics 6, 3911-3914 (2005) (Pubitemid 41734596)
-
(2005)
2005 International Conference on Machine Learning and Cybernetics, ICMLC 2005
, pp. 3911-3914
-
-
Zhao, J.-L.1
Zhao, J.-F.2
Li, J.-J.3
-
14
-
-
9444267133
-
Modeling intrusion detection systems using linear genetic programming approach
-
Innovations in Applied Artificial Intelligence
-
Mukkamala, S., Sung, A., Abraham, A.: 'A Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach'. In: Proceedings of the 17th International Conference on Innovations in Applied Artificial Intelligence, pp. 633-642. Springer, Heidelberg (2004) (Pubitemid 38761268)
-
(2004)
Lecture Notes in Computer Science
, Issue.3029
, pp. 633-642
-
-
Mukkamala, S.1
Sung, A.H.2
Abraham, A.3
-
16
-
-
0242444072
-
Eye detection and face recognition using evolutionary computation
-
Springer, Heidelberg
-
Huang, J., Liu, C., Wechsler, H.: Eye Detection and Face Recognition Using Evolutionary Computation. In: Proceedings of NATO-ASI on Face Recognition: From Theory to Applications, pp. 348-377. Springer, Heidelberg (1998)
-
(1998)
Proceedings of NATO-ASI on Face Recognition: From Theory to Applications
, pp. 348-377
-
-
Huang, J.1
Liu, C.2
Wechsler, H.3
-
17
-
-
84856415381
-
Insider threat analysis using information-centric modeling
-
Craiger, P., Shenoi, S. (eds.), 3rd edn. Springer, New York
-
Upadhyaya, D., Ngo, H., Pramanik, S., Chinchani, R., Mathew, S.: Insider Threat Analysis Using Information-Centric Modeling. In: Craiger, P., Shenoi, S. (eds.) Advances in Digital Forensics, 3rd edn., pp. 53-73. Springer, New York (2007)
-
(2007)
Advances in Digital Forensics
, pp. 53-73
-
-
Upadhyaya, D.1
Ngo, H.2
Pramanik, S.3
Chinchani, R.4
Mathew, S.5
-
18
-
-
36448960780
-
A layered approach to insider threat detection and proactive forensics
-
Tucson, AZ. ACSAC, Silver Spring
-
Bradford, P., Hu, N.: A layered approach to insider threat detection and proactive forensics. In: Technology Blitz of the Twenty-First Annual Computer Security Applications Conference, Tucson, AZ. ACSAC, Silver Spring (2005)
-
(2005)
Technology Blitz of the Twenty-First Annual Computer Security Applications Conference
-
-
Bradford, P.1
Hu, N.2
-
19
-
-
34548490738
-
Improving network security using genetic algorithm approach
-
DOI 10.1016/j.compeleceng.2007.05.010, PII S0045790607000584, Security of Computers and Networks
-
Bankovic, Z., Stepanovic, D., Bojanic, S., Nieto-Taladriz, O.: Improving network security using genetic algorithm approach. Journal of Computers and Electrical Engineering 33(1), 438-451 (2007) (Pubitemid 47376938)
-
(2007)
Computers and Electrical Engineering
, vol.33
, Issue.5-6
, pp. 438-451
-
-
Bankovic, Z.1
Stepanovic, D.2
Bojanic, S.3
Nieto-Taladriz, O.4
-
20
-
-
34548108422
-
Using code metric histograms and genetic algorithms to perform author identification for software forensics
-
DOI 10.1145/1276958.1277364, Proceedings of GECCO 2007: Genetic and Evolutionary Computation Conference
-
Lange, R., Mancoridis, S.: Using Code Metric Histograms and Genetic Algorithms to Perform Author Identification for Software Forensics. In: Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, pp. 2082-2089. ACM, New York (2007) (Pubitemid 47291847)
-
(2007)
Proceedings of GECCO 2007: Genetic and Evolutionary Computation Conference
, pp. 2082-2089
-
-
Lange, R.C.1
Mancoridis, S.2
-
21
-
-
34548117226
-
A dictionary-based system for extracting source code metrics for software forensics
-
IEEE Computer Society, California
-
Gray, A., Sallis, P., MacDonell, S.: A Dictionary-based System for Extracting Source Code Metrics for Software Forensics. In: Proceedings of Software Engineering: Education & Practice, pp. 252-259. IEEE Computer Society, California (1998)
-
(1998)
Proceedings of Software Engineering: Education & Practice
, pp. 252-259
-
-
Gray, A.1
Sallis, P.2
MacDonell, S.3
-
23
-
-
46749156955
-
Craniofacial superimposition in forensic identification using genetic algorithms
-
IEEE Computer Society, California
-
Ballerini, L., Cordon, O., Santamaria, J., Damas, S., Aleman, I., Botella, M.: Craniofacial Superimposition in Forensic Identification using Genetic Algorithms. In: The Third International Symposium on Information Assurance and Security, pp. 429-434. IEEE Computer Society, California (2007)
-
(2007)
The Third International Symposium on Information Assurance and Security
, pp. 429-434
-
-
Ballerini, L.1
Cordon, O.2
Santamaria, J.3
Damas, S.4
Aleman, I.5
Botella, M.6
|