Author of the publication

Testing Detector Parameterization Using Evolutionary Exploit Generation.

, , , and . EvoWorkshops, volume 5484 of Lecture Notes in Computer Science, page 105-110. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolutionary model building under streaming data for classification tasks: opportunities and challenges.. Genetic Programming and Evolvable Machines, 16 (3): 283-326 (2015)Coevolutionary bid-based genetic programming for problem decomposition in classification., and . Genetic Programming and Evolvable Machines, 9 (4): 331-365 (2008)Foundations for an intelligent business logic engine using genetic programming and RuleML-based services., and . IJBPIM, 2 (4): 282-291 (2007)Systems control for a micro-stereolithography prototype., , , , and . Microprocessors and Microsystems - Embedded Hardware Design, 22 (2): 67-77 (1998)On run time libraries and hierarchical symbiosis., , and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2012)Better trade exits for foreign exchange currency trading using FXGP., , and . CEC, page 2510-2517. IEEE, (2015)Evolving TCP/IP packets: A case study of port scans., , and . CISDA, page 1-8. IEEE, (2009)Growing recurrent self organizing map., , and . SMC, page 290-295. IEEE, (2007)Exploring the state space of an application protocol: A case study of SMTP., , and . CICS, page 152-159. IEEE, (2011)Discovering Agent Behaviors Through Code Reuse: Examples From Half-Field Offense and Ms. Pac-Man., and . IEEE Trans. Games, 10 (2): 195-208 (2018)