Securing the Software Defined Perimeter with Evolutionary Co-Optimization
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
ACM|Genetic and Evolutionary Computation Conference Companion
2022
|
Online Access: | https://hdl.handle.net/1721.1/146195 |
_version_ | 1826190653163307008 |
---|---|
author | Shlapentokh-Rothman, Michal Hemberg, Erik O'Reilly, Una-May |
author2 | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory |
author_facet | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory Shlapentokh-Rothman, Michal Hemberg, Erik O'Reilly, Una-May |
author_sort | Shlapentokh-Rothman, Michal |
collection | MIT |
first_indexed | 2024-09-23T08:43:37Z |
format | Article |
id | mit-1721.1/146195 |
institution | Massachusetts Institute of Technology |
language | English |
last_indexed | 2024-09-23T08:43:37Z |
publishDate | 2022 |
publisher | ACM|Genetic and Evolutionary Computation Conference Companion |
record_format | dspace |
spelling | mit-1721.1/1461952023-02-16T16:22:48Z Securing the Software Defined Perimeter with Evolutionary Co-Optimization Shlapentokh-Rothman, Michal Hemberg, Erik O'Reilly, Una-May Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory 2022-11-07T18:34:45Z 2022-11-07T18:34:45Z 2020-07-08 2022-11-02T20:35:31Z Article http://purl.org/eprint/type/ConferencePaper 978-1-4503-7127-8 https://hdl.handle.net/1721.1/146195 Shlapentokh-Rothman, Michal, Hemberg, Erik and O'Reilly, Una-May. 2020. "Securing the Software Defined Perimeter with Evolutionary Co-Optimization." PUBLISHER_POLICY en https://doi.org/10.1145/3377929.3398085 Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. ACM application/pdf ACM|Genetic and Evolutionary Computation Conference Companion ACM|Genetic and Evolutionary Computation Conference Companion |
spellingShingle | Shlapentokh-Rothman, Michal Hemberg, Erik O'Reilly, Una-May Securing the Software Defined Perimeter with Evolutionary Co-Optimization |
title | Securing the Software Defined Perimeter with Evolutionary Co-Optimization |
title_full | Securing the Software Defined Perimeter with Evolutionary Co-Optimization |
title_fullStr | Securing the Software Defined Perimeter with Evolutionary Co-Optimization |
title_full_unstemmed | Securing the Software Defined Perimeter with Evolutionary Co-Optimization |
title_short | Securing the Software Defined Perimeter with Evolutionary Co-Optimization |
title_sort | securing the software defined perimeter with evolutionary co optimization |
url | https://hdl.handle.net/1721.1/146195 |
work_keys_str_mv | AT shlapentokhrothmanmichal securingthesoftwaredefinedperimeterwithevolutionarycooptimization AT hembergerik securingthesoftwaredefinedperimeterwithevolutionarycooptimization AT oreillyunamay securingthesoftwaredefinedperimeterwithevolutionarycooptimization |