Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating the detector coverage in a negative selection algorithm., and . GECCO, page 281-288. ACM, (2005)Applicability issues of the real-valued negative selection algorithms., and . GECCO, page 111-118. ACM, (2006)A conceptual model of self-monitoring multi-core systems., , and . CSIIRW, page 83. ACM, (2010)OPNET/Simulink Based Testbed for Disturbance Detection in the Smart Grid., , , and . CISR, page 17:1-17:4. ACM, (2015)Tutorial: computational intelligence in cyber security.. CICS, IEEE, (2009)An artificial immune system as a multi-agent decision support system.. SMC, page 3816-3820. IEEE, (1998)A Framework for Evolving Multi-Shaped Detectors in Negative Selection., , , and . FOCI, page 401-408. IEEE, (2007)A Group Encoding Technique for Set Partitioning Problems, , and . Proceedings of the Genetic and Evolutionary Computation Conference, 1, page 742--749. Orlando, Florida, USA, Morgan Kaufmann, (13-17 July 1999)On Evolution of stochastic dynamical neural networks, , and . Proceedings of the Genetic and Evolutionary Computation Conference, 1, page 801. Orlando, Florida, USA, Morgan Kaufmann, (13-17 July 1999)Anomaly Detection Using Real-Valued Negative Selection, and . Genetic Programming and Evolvable Machines, 4 (4): 383--403 (December 2003)