Cited By
View all- Zincir-Heywood NKayacik G(2017)Evolutionary computation in network management and securityProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3067695.3067726(1094-1112)Online publication date: 15-Jul-2017
- Cai GWang BHu WWang T(2016)Moving target defense: state of the art and characteristicsFrontiers of Information Technology & Electronic Engineering10.1631/FITEE.160132117:11(1122-1153)Online publication date: 11-Nov-2016
- Oehmen CBruillard PMatzke BPhillips AStar KJensen JNordwall DThompson SPeterson E(2016)LINEBACKER: LINE-Speed Bio-Inspired Analysis and Characterization for Event Recognition2016 IEEE Security and Privacy Workshops (SPW)10.1109/SPW.2016.44(88-95)Online publication date: May-2016
- Show More Cited By