Author of the publication

Towards Byte Code Genetic Programming

, , and . Proceedings of the Genetic and Evolutionary Computation Conference, 2, page 1234. Orlando, Florida, USA, Morgan Kaufmann, (13-17 July 1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Byte Code Genetic Programming, , and . Late Breaking Papers at the Genetic Programming 1998 Conference, University of Wisconsin, Madison, Wisconsin, USA, Stanford University Bookstore, (22-25 July 1998)Joining the Security Education Community., and . IEEE Secur. Priv., 2 (5): 61-63 (2004)Cognitive task analysis of network analysts and managers for network situational awareness., , , , and . VDA, volume 7530 of SPIE Proceedings, page 75300. SPIE, (2010)DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems., , , , and . DPM/SETOP, volume 6514 of Lecture Notes in Computer Science, page 188-202. Springer, (2010)Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities., , , and . SECRYPT, page 546-553. INSTICC Press, (2008)Analysis of an Algorithm for Distributed Recognition and Accountability., , , , , , and . ACM Conference on Computer and Communications Security, page 154-164. ACM, (1993)The Policy Machine for Security Policy Management., , and . International Conference on Computational Science (2), volume 2074 of Lecture Notes in Computer Science, page 494-506. Springer, (2001)Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory., and . ACM Southeast Regional Conference (2), page 142-147. ACM, (2005)1-59593-059-0.Who Owns Your Computer?, and . IEEE Secur. Priv., 4 (2): 61-63 (2006)Configurable Middleware-Level Intrusion Detection for Embedded Systems., , , and . ICDCS Workshops, page 144-151. IEEE Computer Society, (2005)