Author of the publication

Anomaly Detection Using Real-Valued Negative Selection

, and . Genetic Programming and Evolvable Machines, 4 (4): 383--403 (December 2003)
DOI: doi:10.1023/A:1026195112518

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing the Performance of Hybrid Evolutionary Algorithms for the Multiobjective Quadratic Assignment Problem., and . IEEE Congress on Evolutionary Computation, page 1710-1717. IEEE, (2006)Using genetic algorithms for sparse distributed memory initialization., , and . CEC, page 1043-1050. IEEE, (1999)A parallel framework for multi-objective evolutionary optimization., , , , and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2010)Motif discovery in upstream sequences of coordinately expressed genes., , and . IEEE Congress on Evolutionary Computation, page 1596-1603. IEEE, (2003)Intelligent Adaptive Electric Vehicle Motion Control for Dynamic Wireless Charging., , and . ITSC, page 2734-2741. IEEE, (2023)Using Negative Detectors for Identifying Adversarial Data Manipulation in Machine Learning., and . IJCNN, page 1-8. IEEE, (2021)An Evolutionary Approach for Job Assignment., , and . IS, page 139-142. ISCA, (2000)An Evolutionary Approach to Generate Fuzzy Anomaly Signatures., , , and . IAW, page 251-259. IEEE, (2003)Tutorial: computational intelligence in cyber security.. CICS, IEEE, (2009)A Framework for Evolving Multi-Shaped Detectors in Negative Selection., , , and . FOCI, page 401-408. IEEE, (2007)