Author of the publication

Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception.

, , , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 179-186. IOS Press, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception., , , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 179-186. IOS Press, (2020)Tool Support for Finding Anomalies in Refactoring Edits for Improving Software Evolution., , , and . EIT, page 1-7. IEEE, (2020)Analyzing Bug Reports by Topic Mining in Software Evolution., , , and . COMPSAC, page 1645-1652. IEEE, (2021)A new implementation to speed up Genetic Programming., and . RIVF, page 35-40. IEEE, (2015)The Role of Syntactic and Semantic Locality of Crossover in Genetic Programming., , , and . PPSN (2), volume 6239 of Lecture Notes in Computer Science, page 533-542. Springer, (2010)A Data Sampling and Two-Stage Convolution Neural Network for IoT Devices Identification., , and . RIVF, page 458-463. IEEE, (2022)ICT enabling technologies for smart cities., , , , , and . ICACT, page 606-611. IEEE, (2018)Tournament Selection Based on Statistical Test in Genetic Programming., , and . PPSN, volume 9921 of Lecture Notes in Computer Science, page 303-312. Springer, (2016)A Clustering-based Shrink AutoEncoder for Detecting Anomalies in Intrusion Detection Systems., , , and . KSE, page 1-5. IEEE, (2019)Twin Auto-Encoder Model for Learning Separable Representation in Cyberattack Detection., , , , , and . CoRR, (2024)