Author of the publication

Cognition: A Tool for Reinforcing Security in Software Defined Networks

, , , , and . EVOLVE - A Bridge between Probability, Set Oriented Numerics, and Evolutionary Computation V, volume 288 of Advances in Intelligent Systems and Computing, Springer International Publishing, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A priori landscape analysis in guiding interactive multi-objective metaheuristics., , , and . IEEE Congress on Evolutionary Computation, page 4104-4111. IEEE, (2008)Cognition: A Tool for Reinforcing Security in Software Defined Networks, , , , and . EVOLVE - A Bridge between Probability, Set Oriented Numerics, and Evolutionary Computation V, volume 288 of Advances in Intelligent Systems and Computing, Springer International Publishing, (2014)Computing and Selecting ε-Efficient Solutions of 0, 1-Knapsack Problems., , , , and . MCDM, volume 634 of Lecture notes in economics and mathematical systems, page 379-389. Springer, (2008)Computing finite size representations of the set of approximate solutions of an MOP with stochastic search algorithms., , , and . GECCO, page 713-720. ACM, (2008)On Using Cognition for Anomaly Detection in SDN., , , and . EVOLVE, volume 674 of Advances in Intelligent Systems and Computing, page 67-81. Springer, (2015)A survey on sustainability in ICT: a computing perspective., and . GECCO (Companion), page 1213-1220. ACM, (2014)Asymmetric quadratic landscape approximation model., , and . GECCO, page 493-500. ACM, (2014)