Author of the publication

Moving Target Defenses in the Helix Self-Regenerative Architecture.

, , , , , , , and . Moving Target Defense, volume 100 of Advances in Information Security, Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fitness Distance Correlation as a Measure of Problem Difficulty for Genetic Algorithms., and . ICGA, page 184-192. Morgan Kaufmann, (1995)Hype and Heavy Tails: A Closer Look at Data Breaches., , and . WEIS, (2015)Protecting Data Privacy Through Hard-to-Reverse Negative Databases., , , , and . ISC, volume 4176 of Lecture Notes in Computer Science, page 72-84. Springer, (2006)On-line Negative Databases., , , and . Int. J. Unconv. Comput., 1 (3): 201-220 (2005)The Royal Road for Genetic Algorithms: Fitness Landscapes and GA Performance, , and . Toward a Practice of Autonomous Systems: First European Conference on Artificial Life, MIT Press, Cambridge, MA, (1991)An Integrated Model of Traffic, Geography and Economy in the Internet., , and . Comput. Commun. Rev., 38 (3): 5-16 (2008)Randomized instruction set emulation., , , and . ACM Trans. Inf. Syst. Secur., 8 (1): 3-40 (2005)Using Genetic Algorithms to Explore Pattern Recognition in the Immune System., , , and . Evol. Comput., 1 (3): 191-211 (1993)Searching for Diverse, Cooperative Populations with Genetic Algorithms., , and . Evol. Comput., 1 (2): 127-149 (1993)The Ecology of Echo., , and . Artif. Life, 3 (3): 165-190 (1997)