Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using automated search to generate test data for matlab., , and . GECCO, page 1697-1704. ACM, (2009)Human competitive security protocols synthesis., , and . GECCO, page 1855-1856. ACM, (2006)Neural Network Approximation of Simulation-based IDS Fitness Evaluation., and . CSE, page 81-89. IEEE, (2022)A Multi-objective Optimisation Approach to IDS Sensor Placement., , , , , and . CISIS, volume 63 of Advances in Intelligent and Soft Computing, page 101-108. Springer, (2009)Using Genetic Improvement to Retarget quantum Software on Differing Hardware., and . GI@ICSE, page 31-38. IEEE, (2021)Privacy-Aware Split Learning Based Energy Theft Detection for Smart Grids., , and . ICICS, volume 13407 of Lecture Notes in Computer Science, page 281-300. Springer, (2022)SE and AI: A two-way street.. RAISE@ICSE, page 1-3. IEEE Computer Society, (2013)Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization Hypothesis., and . IMACC, volume 8308 of Lecture Notes in Computer Science, page 120-140. Springer, (2013)Data-Driven Search-Based Software Engineering (NII Shonan Meeting 2017-19)., , , and . NII Shonan Meet. Rep., (2017)Continuous User Authentication for Human-Robot Collaboration., , and . ARES, page 115:1-115:9. ACM, (2021)