Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IDS Vulnerability Analysis Using Genertia Red Teams.. Security and Management, page 171-176. CSREA Press, (2003)Solving Distributed Asymmetric CSPs via a Society of Hill-Climbers., and . IC-AI, page 949-953. CSREA Press, (2002)Genetic & Evolutionary Biometric Security: Disposable Feature Extractors for Mitigating Biometric Replay Attacks., , , , , , , , and . CSER, volume 8 of Procedia Computer Science, page 351-360. Elsevier, (2012)Bowl championship series vulnerability analysis., , , , , and . Richard Tapia Celebration of Diversity in Computing Conference, page 1-4. ACM, (2007)GESLIC: genetic and evolutionary-based short-length iris codes., , and . ACM Southeast Regional Conference, page 201-204. ACM, (2011)An evaluation of negative selection algorithm with constraint-based detectors., and . ACM Southeast Regional Conference, page 134-139. ACM, (2006)An artificial immunity approach to malware detection in a mobile platform., , and . EURASIP J. Information Security, (2017)Unconstrained Biometric Identification: Emerging Technologies., , , and . IEEE Computer, 43 (2): 56-62 (2010)Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm red teams., , , and . IEEE Congress on Evolutionary Computation, page 111-116. IEEE, (2004)An artificial immune system for phishing detection., , , , and . IEEE Congress on Evolutionary Computation, page 1-7. IEEE, (2012)