Different Multi-objective Evolutionary Programming Approaches for Detecting Computer Network Attacks. Anchor, K. P., Zydallis, J. B., Gunsch, G. H., & Lamont, G. B. In Fonseca, C. M., Fleming, P. J., Zitzler, E., Deb, K., & Thiele, L., editors, Evolutionary Multi-Criterion Optimization. Second International Conference, EMO 2003, pages 707--721, Faro, Portugal, April, 2003. Springer. Lecture Notes in Computer Science. Volume 2632. bibtex @inproceedings{Anchor03,
author = {Kevin P. Anchor and Jesse B. Zydallis and
Gregg H. Gunsch and Gary B. Lamont},
title = {Different {M}ulti-objective {E}volutionary
{P}rogramming {A}pproaches for {D}etecting {C}omputer {N}etwork {A}ttacks},
booktitle = {Evolutionary Multi-Criterion Optimization. Second
International Conference, EMO 2003},
editor = {Carlos M. Fonseca and Peter J. Fleming and Eckart Zitzler
and Kalyanmoy Deb and Lothar Thiele},
publisher = {Springer. Lecture Notes in Computer Science. Volume 2632},
pages = {707--721},
address = {Faro, Portugal},
month = {April},
year = {2003}
}
Downloads: 0
{"_id":"iMioErz3de2Ay9wrC","bibbaseid":"anchor-zydallis-gunsch-lamont-differentmultiobjectiveevolutionaryprogrammingapproachesfordetectingcomputernetworkattacks-2003","downloads":0,"creationDate":"2016-04-20T19:53:05.952Z","title":"Different Multi-objective Evolutionary Programming Approaches for Detecting Computer Network Attacks","author_short":["Anchor, K. P.","Zydallis, J. B.","Gunsch, G. H.","Lamont, G. B."],"year":2003,"bibtype":"inproceedings","biburl":"http://delta.cs.cinvestav.mx/~ccoello/EMOO/EMOO.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Kevin","P."],"propositions":[],"lastnames":["Anchor"],"suffixes":[]},{"firstnames":["Jesse","B."],"propositions":[],"lastnames":["Zydallis"],"suffixes":[]},{"firstnames":["Gregg","H."],"propositions":[],"lastnames":["Gunsch"],"suffixes":[]},{"firstnames":["Gary","B."],"propositions":[],"lastnames":["Lamont"],"suffixes":[]}],"title":"Different Multi-objective Evolutionary Programming Approaches for Detecting Computer Network Attacks","booktitle":"Evolutionary Multi-Criterion Optimization. Second International Conference, EMO 2003","editor":[{"firstnames":["Carlos","M."],"propositions":[],"lastnames":["Fonseca"],"suffixes":[]},{"firstnames":["Peter","J."],"propositions":[],"lastnames":["Fleming"],"suffixes":[]},{"firstnames":["Eckart"],"propositions":[],"lastnames":["Zitzler"],"suffixes":[]},{"firstnames":["Kalyanmoy"],"propositions":[],"lastnames":["Deb"],"suffixes":[]},{"firstnames":["Lothar"],"propositions":[],"lastnames":["Thiele"],"suffixes":[]}],"publisher":"Springer. Lecture Notes in Computer Science. Volume 2632","pages":"707--721","address":"Faro, Portugal","month":"April","year":"2003","bibtex":"@inproceedings{Anchor03,\n author = {Kevin P. Anchor and Jesse B. Zydallis and\n Gregg H. Gunsch and Gary B. Lamont},\n title = {Different {M}ulti-objective {E}volutionary\n {P}rogramming {A}pproaches for {D}etecting {C}omputer {N}etwork {A}ttacks},\n booktitle = {Evolutionary Multi-Criterion Optimization. Second\n International Conference, EMO 2003},\n editor = {Carlos M. Fonseca and Peter J. Fleming and Eckart Zitzler\n and Kalyanmoy Deb and Lothar Thiele},\n publisher = {Springer. Lecture Notes in Computer Science. Volume 2632},\n pages = {707--721},\n address = {Faro, Portugal},\n month = {April},\n year = {2003}\n}\n\n","author_short":["Anchor, K. P.","Zydallis, J. B.","Gunsch, G. H.","Lamont, G. B."],"editor_short":["Fonseca, C. M.","Fleming, P. J.","Zitzler, E.","Deb, K.","Thiele, L."],"key":"Anchor03","id":"Anchor03","bibbaseid":"anchor-zydallis-gunsch-lamont-differentmultiobjectiveevolutionaryprogrammingapproachesfordetectingcomputernetworkattacks-2003","role":"author","urls":{},"downloads":0},"search_terms":["different","multi","objective","evolutionary","programming","approaches","detecting","computer","network","attacks","anchor","zydallis","gunsch","lamont"],"keywords":[],"authorIDs":[],"dataSources":["wGMs8MzbpbdJFLyJk"]}