Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Key Installation Protection using Computerized Red Teaming., , , and . ACSC, volume 113 of CRPIT, page 137-144. Australian Computer Society, (2011)Real-time Evolutionary Learning of Cooperative Predator-Prey Strategies., , , and . ACSC, volume 122 of CRPIT, page 81-90. Australian Computer Society, (2012)Using Monte Carlo Tree Search for replanning in a multistage simultaneous game., , and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2012)Red teaming with coevolution., and . IEEE Congress on Evolutionary Computation, page 1155-1163. IEEE, (2011)Mobile games with intelligence: A killer application?, , and . CIG, page 1-7. IEEE, (2013)Game level layout generation using evolved cellular automata., , , and . Connect. Sci., 28 (1): 63-82 (2016)RedTNet: A network model for strategy games., , and . IEEE Congress on Evolutionary Computation, page 1-9. IEEE, (2010)∗Tego - A framework for adversarial planning., and . IEEE Congress on Evolutionary Computation, page 13-20. IEEE, (2014)Dynamic Difficulty Adjustment in 2D Platformers through Agent-Based Procedural Level Generation., , , and . SMC, page 2778-2785. IEEE, (2015)A Statistical Rule Learning Approach to Network Intrusion Detection., , and . ICITCS, page 1-5. IEEE Computer Society, (2015)