Testing Detector Parameterization Using Evolutionary Exploit Generation. Kayacik, H. G., Zincir-Heywood, A. N., Heywood, M. I., & Burschka, S. In Giacobini, M., Brabazon, A., Cagnoni, S., Caro, G. A. D., Ekárt, A., Esparcia-Alc'azar, A. I., Farooq, M., Fink, A., & Machado, P., editors, Applications of Evolutionary Computing (EvoWorkshops 2009), pages 105--110. Springer, Lecture Notes in Computer Science, Vol. 5484, Heidelberg, Germany, 2009. bibtex @incollection{Kayacik09,
author = {Hilmi G. Kayacik and A. Nur Zincir-Heywood and Malcolm I. Heywood
and Stefan Burschka},
title = {{Testing Detector Parameterization Using Evolutionary Exploit Generation}},
booktitle = {Applications of Evolutionary Computing (EvoWorkshops 2009)},
editor = {Mario Giacobini and Anthony Brabazon and Stefano Cagnoni and Gianni
A. Di Caro and Anik\'{o} Ek\'{a}rt and Anna Isabel Esparcia-Alc'{a}zar
and Muddassar Farooq and Andreas Fink and Penousal Machado},
pages = {105--110},
publisher = {Springer, Lecture Notes in Computer Science, Vol. 5484},
address = {Heidelberg, Germany},
year = {2009}
}
Downloads: 0
{"_id":"3vh5PWL7ootwW9Cji","bibbaseid":"kayacik-zincirheywood-heywood-burschka-testingdetectorparameterizationusingevolutionaryexploitgeneration-2009","downloads":0,"creationDate":"2016-04-20T19:53:25.799Z","title":"Testing Detector Parameterization Using Evolutionary Exploit Generation","author_short":["Kayacik, H. G.","Zincir-Heywood, A. N.","Heywood, M. I.","Burschka, S."],"year":2009,"bibtype":"incollection","biburl":"http://delta.cs.cinvestav.mx/~ccoello/EMOO/EMOO.bib","bibdata":{"bibtype":"incollection","type":"incollection","author":[{"firstnames":["Hilmi","G."],"propositions":[],"lastnames":["Kayacik"],"suffixes":[]},{"firstnames":["A.","Nur"],"propositions":[],"lastnames":["Zincir-Heywood"],"suffixes":[]},{"firstnames":["Malcolm","I."],"propositions":[],"lastnames":["Heywood"],"suffixes":[]},{"firstnames":["Stefan"],"propositions":[],"lastnames":["Burschka"],"suffixes":[]}],"title":"Testing Detector Parameterization Using Evolutionary Exploit Generation","booktitle":"Applications of Evolutionary Computing (EvoWorkshops 2009)","editor":[{"firstnames":["Mario"],"propositions":[],"lastnames":["Giacobini"],"suffixes":[]},{"firstnames":["Anthony"],"propositions":[],"lastnames":["Brabazon"],"suffixes":[]},{"firstnames":["Stefano"],"propositions":[],"lastnames":["Cagnoni"],"suffixes":[]},{"firstnames":["Gianni","A.","Di"],"propositions":[],"lastnames":["Caro"],"suffixes":[]},{"firstnames":["Anikó"],"propositions":[],"lastnames":["Ekárt"],"suffixes":[]},{"firstnames":["Anna","Isabel"],"propositions":[],"lastnames":["Esparcia-Alc'azar"],"suffixes":[]},{"firstnames":["Muddassar"],"propositions":[],"lastnames":["Farooq"],"suffixes":[]},{"firstnames":["Andreas"],"propositions":[],"lastnames":["Fink"],"suffixes":[]},{"firstnames":["Penousal"],"propositions":[],"lastnames":["Machado"],"suffixes":[]}],"pages":"105--110","publisher":"Springer, Lecture Notes in Computer Science, Vol. 5484","address":"Heidelberg, Germany","year":"2009","bibtex":"@incollection{Kayacik09,\n author = {Hilmi G. Kayacik and A. Nur Zincir-Heywood and Malcolm I. Heywood\n\tand Stefan Burschka},\n title = {{Testing Detector Parameterization Using Evolutionary Exploit Generation}},\n booktitle = {Applications of Evolutionary Computing (EvoWorkshops 2009)},\n editor = {Mario Giacobini and Anthony Brabazon and Stefano Cagnoni and Gianni\n\tA. Di Caro and Anik\\'{o} Ek\\'{a}rt and Anna Isabel Esparcia-Alc'{a}zar\n\tand Muddassar Farooq and Andreas Fink and Penousal Machado},\n pages = {105--110},\n publisher = {Springer, Lecture Notes in Computer Science, Vol. 5484},\n address = {Heidelberg, Germany},\n year = {2009}\n}\n\n","author_short":["Kayacik, H. G.","Zincir-Heywood, A. N.","Heywood, M. I.","Burschka, S."],"editor_short":["Giacobini, M.","Brabazon, A.","Cagnoni, S.","Caro, G. A. D.","Ekárt, A.","Esparcia-Alc'azar, A. I.","Farooq, M.","Fink, A.","Machado, P."],"key":"Kayacik09","id":"Kayacik09","bibbaseid":"kayacik-zincirheywood-heywood-burschka-testingdetectorparameterizationusingevolutionaryexploitgeneration-2009","role":"author","urls":{},"downloads":0},"search_terms":["testing","detector","parameterization","using","evolutionary","exploit","generation","kayacik","zincir-heywood","heywood","burschka"],"keywords":[],"authorIDs":[],"dataSources":["wGMs8MzbpbdJFLyJk"]}