Author of the publication

Security Awareness in Smart Homes and Internet of Things Networks through Swarm-Based Cybersecurity Penetration Testing.

, , , and . Inf., 14 (10): 536 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effects of Module Encapsulation in Repetitively Modular Genotypes on the Search Space., , and . GECCO (1), volume 3102 of Lecture Notes in Computer Science, page 1125-1137. Springer, (2004)Genome Length as an Evolutionary Self-adaptation., , , , and . PPSN, volume 1498 of Lecture Notes in Computer Science, page 345-356. Springer, (1998)Distributed Consensus Formation Through Unconstrained Gossiping, and . CoRR, (2013)The Proportional Genetic Algorithm: Gene Expression in a Genetic Algorithm., and . Genet. Program. Evolvable Mach., 3 (2): 157-192 (2002)Genetic algorithms with self-adaptation for predictive classification of Medicare standardized payments for physical therapists., , and . Expert Syst. Appl., (May 2023)Evolving control for distributed micro air vehicles., , and . CIRA, page 174-179. IEEE, (1999)Iterative weighted 2D orientation averaging that minimizes arc-length between vectors., and . IROS, page 2499-2504. IEEE, (2017)GFAM: Evolving Fuzzy ARTMAP neural networks., , , , , and . Neural Networks, 20 (8): 874-892 (2007)Visual analysis of evolutionary algorithms., , , , and . CEC, page 1419-1425. IEEE, (1999)Evolved response thresholds generalize across problem instances for a deterministic-response multiagent system., , and . GECCO Companion, page 73-74. ACM, (2021)