Author of the publication

Improved Approach of Genetic Programming and Applications for Data Mining.

, and . ICNC (1), volume 4221 of Lecture Notes in Computer Science, page 816-819. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Strategy Selection for Cyber Deception via Deep Reinforcement Learning., , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 1841-1847. IEEE, (2022)The Astringency of the GP Algorithm for Forecasting Software Failure Data Series., and . Data Sci. J., (2007)Optimal strategy selection for attack graph games using deep reinforcement learning., , and . HPCC/DSS/SmartCity/DependSys, page 823-830. IEEE, (2022)Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity., , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 3804-3821 (2022)A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses., , , and . CoRR, (2019)Blockchain-based automated and robust cyber security management., , , , , , , , and . J. Parallel Distributed Comput., (2022)Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity., , and . CoRR, (2021)AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection., , , , , , , and . SciSec, volume 14299 of Lecture Notes in Computer Science, page 207-224. Springer, (2023)Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy., , and . SciSec, volume 14299 of Lecture Notes in Computer Science, page 42-59. Springer, (2023)Quantifying Cybersecurity Effectiveness of Software Diversity., , , , and . CoRR, (2021)