Author of the publication

Evolution of classification rules for comprehensible knowledge discovery.

, , and . IEEE Congress on Evolutionary Computation, page 1261-1268. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reports of the Workshops of the 32nd AAAI Conference on Artificial Intelligence., , , , , , , , , and 21 other author(s). AI Mag., 39 (4): 45-56 (2018)Evolution of classification rules for comprehensible knowledge discovery., , and . IEEE Congress on Evolutionary Computation, page 1261-1268. IEEE, (2007)Assessing Mission Performance for Technology Reliant Missions., , , and . HICSS, page 1-9. ScholarSpace, (2020)Towards automated cyber decision support: A case study on network segmentation for security., , , , , , and . SSCI, page 1-10. IEEE, (2016)Adversarial co-evolution of attack and defense in a segmented computer network environment., , , , and . GECCO (Companion), page 1648-1655. ACM, (2018)Agent-based simulation in support of moving target cyber defense technology development and evaluation., , , , , and . SpringSim (CNS), page 16-23. SCS/ACM, (2015)Agent-based simulation for assessing network security risk due to unauthorized hardware., , , , , and . SpringSim (ADS), page 18-26. SCS/ACM, (2015)Adaptive Attacker Strategy Development Against Moving Target Cyber Defenses., , , and . CoRR, (2014)Comparison of cooperative and classical evolutionary algorithms for global supply chain optimisation., , , , and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2010)Optimising supply chain networks by means of a hybridised simulation-based approach., , , , and . IEEE Congress on Evolutionary Computation, page 1-6. IEEE, (2010)