Author of the publication

Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing.

, , , and . CISDA, page 1-8. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Foundations for an intelligent business logic engine using genetic programming and RuleML-based services., and . Int. J. Bus. Process. Integr. Manag., 2 (4): 282-291 (2007)Discovering Agent Behaviors Through Code Reuse: Examples From Half-Field Offense and Ms. Pac-Man., and . IEEE Trans. Games, 10 (2): 195-208 (2018)Heterogeneous Digital Library Query Platform Using a Truly Distributed Multi-Agent Search., , , and . Int. J. Cooperative Inf. Syst., 9 (3): 229-254 (2000)Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race., , and . Appl. Soft Comput., 11 (7): 4366-4383 (2011)Training genetic programming on half a million patterns: an example from anomaly detection., , and . IEEE Trans. Evol. Comput., 9 (3): 225-239 (2005)Object-Orientated Design of Digital Library Platforms for Multiagent Environments., , and . IEEE Trans. Knowl. Data Eng., 14 (2): 281-295 (2002)Coevolutionary bid-based genetic programming for problem decomposition in classification., and . Genet. Program. Evolvable Mach., 9 (4): 331-365 (2008)Evolutionary model building under streaming data for classification tasks: opportunities and challenges.. Genet. Program. Evolvable Mach., 16 (3): 283-326 (2015)Digital library query clearing using clustering and fuzzy decision-making., , and . Inf. Process. Manag., 36 (4): 571-583 (2000)Systems control for a micro-stereolithography prototype., , , , and . Microprocess. Microsystems, 22 (2): 67-77 (1998)