Author of the publication

Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race.

, , and . Appl. Soft Comput., 11 (7): 4366-4383 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CasGP: building cascaded hierarchical models using niching., , and . Congress on Evolutionary Computation, page 1180-1187. IEEE, (2005)An analysis of clustering objectives for feature selection applied to encrypted traffic identification., , and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2010)Object-Orientated Design of Digital Library Platforms for Multiagent Environments., , and . IEEE Trans. Knowl. Data Eng., 14 (2): 281-295 (2002)Real-time digital-optical correlator-systems design., , , , , , , and . Microprocessors and Microsystems - Embedded Hardware Design, 23 (8-9): 501-511 (1999)Evolving Successful Stack Overflow Attacks for Vulnerability Testing., , and . ACSAC, page 225-234. IEEE Computer Society, (2005)Genotypic versus Behavioural Diversity for Teams of Programs under the 4-v-3 Keepaway Soccer Task., and . AAAI, page 3110-3111. AAAI Press, (2014)On Dataset Biases in a Learning System with Minimum A Priori Information for Intrusion Detection., , and . CNSR, page 181-189. IEEE Computer Society, (2004)Resource Review: Three Open Source Systems for Evolving Programs-Lilgp, ECJ and Grammatical Evolution., , and . Genetic Programming and Evolvable Machines, 5 (1): 103-105 (2004)Automated Optic Nerve Analysis for Diagnostic Support in Glaucoma., , , , and . CBMS, page 97-102. IEEE Computer Society, (2005)Emergent Solutions to High-Dimensional Multitask Reinforcement Learning., and . Evolutionary Computation, (2018)