Author of the publication

An investigation into cooperative behaviour : altruism and evolutionary computing.

. De Montfort University, Leicester, UK, (2003)British Library, EThOS.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructive Recursive Deterministic Perceptron Neural Networks with Genetic Algorithms., , , and . IJPRAI, (2013)Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R Attacks., , , and . CyberSec, page 101-106. IEEE Computer Society, (2015)A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks., , , and . Security and Communication Networks, (2017)Hybrid feature selection technique for intrusion detection system., , and . IJHPCN, 13 (2): 232-240 (2019)Re-thinking threat intelligence., , , and . CyCon U.S., page 131-139. IEEE Computer Society, (2016)The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence., , , , , , and . CEC, page 1015-1021. IEEE, (2016)Motivation and opportunity based model to reduce information security insider threats in organisations., , , and . J. Inf. Secur. Appl., (2018)Peer-assisted location authentication and access control for wireless networks., , , and . Internet Technol. Lett., (2019)An investigation into cooperative behaviour : altruism and evolutionary computing.. De Montfort University, Leicester, UK, (2003)British Library, EThOS.An Initial Investigation into Attribution in SCADA Systems., , and . ICS-CSR, BCS, (2013)