Author of the publication

A Linear Genetic Programming Approach to Intrusion Detection

, , and . Genetic and Evolutionary Computation -- GECCO-2003, volume 2724 of LNCS, page 2325--2336. Chicago, Springer-Verlag, (12-16 July 2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolving Buffer Overflow Attacks with Detector Feedback, , and . Applications of Evolutionary Computing, EvoWorkshops2007: EvoCOMNET, EvoFIN, EvoIASP, EvoInteraction, EvoMUSART, EvoSTOC, EvoTransLog, volume 4448 of LNCS, page 11--20. Valencia, Spain, EvoStar, Springer Verlag, (11-13 April 2007)A Linear Genetic Programming Approach to Intrusion Detection, , and . Genetic and Evolutionary Computation -- GECCO-2003, volume 2724 of LNCS, page 2325--2336. Chicago, Springer-Verlag, (12-16 July 2003)Evolving Recurrent Linear-GP for Document Classification and Word Tracking, and . Proceedings of the 2006 IEEE Congress on Evolutionary Computation, page 8605--8612. Vancouver, IEEE Press, (6-21 July 2006)Intelligent Packets For Dynamic Network Routing Using Distributed Genetic Algorithm., , and . GECCO, page 88-96. Morgan Kaufmann, (2002)Genetic Programming Based WiFi Data Link Layer Attack Detection, and . 4th Annual Communication Networks and Services Research Conference (CNSR'06), page 285--292. IEEE Computer Society, (2006)802.11 Network Intrusion Detection using Genetic Programming, and . Genetic and Evolutionary Computation Conference (GECCO2005) workshop program, page 170--171. Washington, D.C., USA, ACM Press, (25-29 June 2005)Training genetic programming on half a million patterns: an example from anomaly detection, , and . IEEE Transactions on Evolutionary Computation, 9 (3): 225--239 (June 2005)Evolving recurrent models using linear GP, , and . GECCO 2005: Proceedings of the 2005 conference on Genetic and evolutionary computation, 2, page 1787--1788. Washington DC, USA, ACM Press, (25-29 June 2005)802.11 De-authentication Attack Detection using Genetic Programming, and . Proceedings of the 9th European Conference on Genetic Programming, volume 3905 of Lecture Notes in Computer Science, page 1--12. Budapest, Hungary, Springer, (10 - 12 April 2006)CasGP: Building Cascaded Hierarchical Models Using Niching, , and . Proceedings of the 2005 IEEE Congress on Evolutionary Computation, 2, page 1180--1187. Edinburgh, UK, IEEE Press, (2-5 September 2005)