Genetic programming approach for multi-category pattern classification applied to network intrusions detection

KM Faraoun, A Boukelif - International Journal of Computational …, 2006 - World Scientific
The present paper describes a new approach of classification using genetic programming.
The proposed technique consists of genetically co-evolve a population of nonlinear …

Security attack detection using genetic algorithm (ga) in policy based network

ABMA Al Islam, A Azad, K Alam… - … on Information and …, 2007 - ieeexplore.ieee.org
We present a modern approach of detecting the computer network security attacks
(commonly termed as" hacks") by using an artificial intelligence method known as a genetic …

Securing network traffic using genetically evolved transformations

KM Faraoun, A Boukelif - Malaysian Journal of Computer Science, 2006 - ijie.um.edu.my
The paper describes a new approach of classification using genetic programming. The
proposed technique consists of genetically coevolving a population of non-linear …

Genetic Algorithm Approach for Intrusion Detection

YB Reddy - Proceedings of Modeling, Simulation, and Optimization …, 2004 - actapress.com
GENETIC ALGORITHM APPROACH FOR INTRUSION DETECTION YB Reddy Department of
Mathematics and Computer Science Grambling State University, Grambling, LA 71245, USA …

[图书][B] Automated grasping for articulated structures using evolutionary learning algorithms

R Globisch - 2005 - search.proquest.com
The human face and hands, as well as the animation thereof, are very complex and are
difficult to model realistically in computer graphics. A lot of research, that deals with the …

[PDF][PDF] Genetic Programming approach for multi-category pattern classification applied to network intrusions detection

KM Faraoun, A Boukelif - International Journal of Computational …, 2007 - academia.edu
This paper describes a new approach of classification using genetic programming. The
proposed technique consists of genetically coevolving a population of non-linear …

[引用][C] A Survey of Selected Evolutionary Computing Methods in Information Security (May 2006)

MC Makai