Author of the publication

Optimising cancer chemotherapy using an estimation of distribution algorithm and genetic algorithms.

, , and . GECCO, page 413-418. ACM, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolutionary Computation for Optimal Component Deployment with Multitenancy Isolation in Cloud-hosted Applications., , and . INISTA, page 1-7. IEEE, (2018)Adaptive fault detection tool for real-time integrity monitoring of Subsea Control Systems., and . INISTA, page 21-26. IEEE, (2014)Botnet Detection in the Internet of Things using Deep Learning Approaches., , and . IJCNN, page 1-8. IEEE, (2018)Ensemble Common Features Technique for Lightweight Intrusion Detection in Industrial Control System., and . ICPS, page 1-6. IEEE, (2023)Evolving ANN-based sensors for a context-aware cyber physical system of an offshore gas turbine., , and . Evol. Syst., 9 (2): 119-133 (2018)FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAI., , , , and . ESORICS Workshops (2), volume 14399 of Lecture Notes in Computer Science, page 426-441. Springer, (2023)Evaluating Degrees of Multitenancy Isolation: A Case Study of Cloud-Hosted GSD Tools., , and . ICCAC, page 101-112. IEEE Computer Society, (2015)Degrees of tenant isolation for cloud-hosted software services: a cross-case analysis., , and . J. Cloud Comput., (2018)Optimal deployment of components of cloud-hosted application for guaranteeing multitenancy isolation., , and . J. Cloud Comput., (2019)Smart problem solving environment for medical decision support., and . GECCO Workshops, page 152-158. ACM, (2005)