Author of the publication

Evolvable simulations applied to Automated Red Teaming: A preliminary study.

, , , and . WSC, page 1444-1455. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BinGo: cross-architecture cross-OS binary search., , , , , and . SIGSOFT FSE, page 678-689. ACM, (2016)A multi-view context-aware approach to Android malware detection and malicious code localization., , , and . Empir. Softw. Eng., 23 (3): 1222-1274 (2018)Detection and classification of malicious JavaScript via attack behavior modelling., , , , , and . ISSTA, page 48-59. ACM, (2015)A scalable approach for malware detection through bounded feature space behavior modeling., , , , and . ASE, page 312-322. IEEE, (2013)Application of Multi-objective Bee Colony Optimization Algorithm to Automated Red Teaming., , and . WSC, page 1798-1808. IEEE, (2009)Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based Limited Symbolic Evaluation., , , , and . COMPSAC Workshops, page 559-564. IEEE Computer Society, (2012)graph2vec: Learning Distributed Representations of Graphs., , , , , and . CoRR, (2017)Evolvable simulations applied to Automated Red Teaming: A preliminary study., , , and . WSC, page 1444-1455. IEEE, (2010)Scalable analysis for malware and vulnerability detection in binaries. Nanyang Technological University, Singapore, (2018)Evolutionary design of agent-based simulation experiments., , , , , and . AAMAS, page 1321-1322. IFAAMAS, (2011)