메뉴 건너뛰기




Volumn 394, Issue , 2012, Pages 25-34

Evolutionary computation in computer security and forensics: An overview

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84856464520     PISSN: 1860949X     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-25237-2_3     Document Type: Conference Paper
Times cited : (6)

References (23)
  • 5
    • 77952042681 scopus 로고    scopus 로고
    • Expert evolutionary computation in computer security and cryptography
    • Castro, J., Vinela, P.: Expert Evolutionary Computation in Computer Security and Cryptography. New Generation Computing Magazine 23(3), 193-199 (2005)
    • (2005) New Generation Computing Magazine , vol.23 , Issue.3 , pp. 193-199
    • Castro, J.1    Vinela, P.2
  • 6
    • 85047322127 scopus 로고    scopus 로고
    • An application of machine learning to network intrusion detection
    • IEEE, AZ
    • Sinclair, C., Pierce, L., Matzner, S.: An Application of Machine Learning to Network Intrusion Detection. In: Computer Phoenix, AZ, pp. 371-377. IEEE, AZ (1999)
    • (1999) Computer Phoenix, AZ , pp. 371-377
    • Sinclair, C.1    Pierce, L.2    Matzner, S.3
  • 14
    • 9444267133 scopus 로고    scopus 로고
    • Modeling intrusion detection systems using linear genetic programming approach
    • Innovations in Applied Artificial Intelligence
    • Mukkamala, S., Sung, A., Abraham, A.: 'A Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach'. In: Proceedings of the 17th International Conference on Innovations in Applied Artificial Intelligence, pp. 633-642. Springer, Heidelberg (2004) (Pubitemid 38761268)
    • (2004) Lecture Notes in Computer Science , Issue.3029 , pp. 633-642
    • Mukkamala, S.1    Sung, A.H.2    Abraham, A.3
  • 17
    • 84856415381 scopus 로고    scopus 로고
    • Insider threat analysis using information-centric modeling
    • Craiger, P., Shenoi, S. (eds.), 3rd edn. Springer, New York
    • Upadhyaya, D., Ngo, H., Pramanik, S., Chinchani, R., Mathew, S.: Insider Threat Analysis Using Information-Centric Modeling. In: Craiger, P., Shenoi, S. (eds.) Advances in Digital Forensics, 3rd edn., pp. 53-73. Springer, New York (2007)
    • (2007) Advances in Digital Forensics , pp. 53-73
    • Upadhyaya, D.1    Ngo, H.2    Pramanik, S.3    Chinchani, R.4    Mathew, S.5
  • 19
    • 34548490738 scopus 로고    scopus 로고
    • Improving network security using genetic algorithm approach
    • DOI 10.1016/j.compeleceng.2007.05.010, PII S0045790607000584, Security of Computers and Networks
    • Bankovic, Z., Stepanovic, D., Bojanic, S., Nieto-Taladriz, O.: Improving network security using genetic algorithm approach. Journal of Computers and Electrical Engineering 33(1), 438-451 (2007) (Pubitemid 47376938)
    • (2007) Computers and Electrical Engineering , vol.33 , Issue.5-6 , pp. 438-451
    • Bankovic, Z.1    Stepanovic, D.2    Bojanic, S.3    Nieto-Taladriz, O.4
  • 20
    • 34548108422 scopus 로고    scopus 로고
    • Using code metric histograms and genetic algorithms to perform author identification for software forensics
    • DOI 10.1145/1276958.1277364, Proceedings of GECCO 2007: Genetic and Evolutionary Computation Conference
    • Lange, R., Mancoridis, S.: Using Code Metric Histograms and Genetic Algorithms to Perform Author Identification for Software Forensics. In: Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, pp. 2082-2089. ACM, New York (2007) (Pubitemid 47291847)
    • (2007) Proceedings of GECCO 2007: Genetic and Evolutionary Computation Conference , pp. 2082-2089
    • Lange, R.C.1    Mancoridis, S.2
  • 21
    • 34548117226 scopus 로고    scopus 로고
    • A dictionary-based system for extracting source code metrics for software forensics
    • IEEE Computer Society, California
    • Gray, A., Sallis, P., MacDonell, S.: A Dictionary-based System for Extracting Source Code Metrics for Software Forensics. In: Proceedings of Software Engineering: Education & Practice, pp. 252-259. IEEE Computer Society, California (1998)
    • (1998) Proceedings of Software Engineering: Education & Practice , pp. 252-259
    • Gray, A.1    Sallis, P.2    MacDonell, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.