Author of the publication

Genetic Programming Based WiFi Data Link Layer Attack Detection

, and . 4th Annual Communication Networks and Services Research Conference (CNSR'06), page 285--292. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

802.11 network intrusion detection using genetic programming., and . GECCO Workshops, page 170-171. ACM, (2005)Evolving TCP/IP packets: A case study of port scans., , and . CISDA, page 1-8. IEEE, (2009)Using Code Bloat to Obfuscate Evolved Network Traffic., , and . EvoApplications (2), volume 6025 of Lecture Notes in Computer Science, page 101-110. Springer, (2010)Genetic Programming Based WiFi Data Link Layer Attack Detection., and . CNSR, page 285-292. IEEE Computer Society, (2006)Genetic Programming Based WiFi Data Link Layer Attack Detection, and . 4th Annual Communication Networks and Services Research Conference (CNSR'06), page 285--292. IEEE Computer Society, (2006)802.11 Network Intrusion Detection using Genetic Programming, and . Genetic and Evolutionary Computation Conference (GECCO2005) workshop program, page 170--171. Washington, D.C., USA, ACM Press, (25-29 June 2005)How far an evolutionary approach can go for protocol state analysis and discovery., , and . IEEE Congress on Evolutionary Computation, page 3228-3235. IEEE, (2013)802.11 De-authentication Attack Detection using Genetic Programming, and . Proceedings of the 9th European Conference on Genetic Programming, volume 3905 of Lecture Notes in Computer Science, page 1--12. Budapest, Hungary, Springer, (10 - 12 April 2006)A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks on WiFi Networks., , and . CISDA, page 213-219. IEEE, (2007)Exploring the state space of an application protocol: A case study of SMTP., , and . CICS, page 152-159. IEEE, (2011)