Author of the publication

Dynamic Insider Threat Detection Based on Adaptable Genetic Programming.

, , and . SSCI, page 2579-2586. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coevolutionary bid-based genetic programming for problem decomposition in classification., and . Genet. Program. Evolvable Mach., 9 (4): 331-365 (2008)Evolutionary model building under streaming data for classification tasks: opportunities and challenges.. Genet. Program. Evolvable Mach., 16 (3): 283-326 (2015)Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race., , and . Appl. Soft Comput., 11 (7): 4366-4383 (2011)Heterogeneous Digital Library Query Platform Using a Truly Distributed Multi-Agent Search., , , and . Int. J. Cooperative Inf. Syst., 9 (3): 229-254 (2000)Training genetic programming on half a million patterns: an example from anomaly detection., , and . IEEE Trans. Evol. Comput., 9 (3): 225-239 (2005)Discovering Agent Behaviors Through Code Reuse: Examples From Half-Field Offense and Ms. Pac-Man., and . IEEE Trans. Games, 10 (2): 195-208 (2018)The effect of routing under local information using a social insect metaphor., , and . IEEE Congress on Evolutionary Computation, page 1438-1443. IEEE, (2002)Digital library query clearing using clustering and fuzzy decision-making., , and . Inf. Process. Manag., 36 (4): 571-583 (2000)Scaling Genetic Programming to Large Datasets Using Hierarchical Dynamic Subset Selection., , and . IEEE Trans. Syst. Man Cybern. Part B, 37 (4): 1065-1073 (2007)Systems control for a micro-stereolithography prototype., , , , and . Microprocess. Microsystems, 22 (2): 67-77 (1998)