Securing the Software Defined Perimeter with Evolutionary Co-Optimization

Bibliographic Details
Main Authors: Shlapentokh-Rothman, Michal, Hemberg, Erik, O'Reilly, Una-May
Other Authors: Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Format: Article
Language:English
Published: ACM|Genetic and Evolutionary Computation Conference Companion 2022
Online Access:https://hdl.handle.net/1721.1/146195
_version_ 1826190653163307008
author Shlapentokh-Rothman, Michal
Hemberg, Erik
O'Reilly, Una-May
author2 Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
author_facet Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Shlapentokh-Rothman, Michal
Hemberg, Erik
O'Reilly, Una-May
author_sort Shlapentokh-Rothman, Michal
collection MIT
first_indexed 2024-09-23T08:43:37Z
format Article
id mit-1721.1/146195
institution Massachusetts Institute of Technology
language English
last_indexed 2024-09-23T08:43:37Z
publishDate 2022
publisher ACM|Genetic and Evolutionary Computation Conference Companion
record_format dspace
spelling mit-1721.1/1461952023-02-16T16:22:48Z Securing the Software Defined Perimeter with Evolutionary Co-Optimization Shlapentokh-Rothman, Michal Hemberg, Erik O'Reilly, Una-May Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory 2022-11-07T18:34:45Z 2022-11-07T18:34:45Z 2020-07-08 2022-11-02T20:35:31Z Article http://purl.org/eprint/type/ConferencePaper 978-1-4503-7127-8 https://hdl.handle.net/1721.1/146195 Shlapentokh-Rothman, Michal, Hemberg, Erik and O'Reilly, Una-May. 2020. "Securing the Software Defined Perimeter with Evolutionary Co-Optimization." PUBLISHER_POLICY en https://doi.org/10.1145/3377929.3398085 Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. ACM application/pdf ACM|Genetic and Evolutionary Computation Conference Companion ACM|Genetic and Evolutionary Computation Conference Companion
spellingShingle Shlapentokh-Rothman, Michal
Hemberg, Erik
O'Reilly, Una-May
Securing the Software Defined Perimeter with Evolutionary Co-Optimization
title Securing the Software Defined Perimeter with Evolutionary Co-Optimization
title_full Securing the Software Defined Perimeter with Evolutionary Co-Optimization
title_fullStr Securing the Software Defined Perimeter with Evolutionary Co-Optimization
title_full_unstemmed Securing the Software Defined Perimeter with Evolutionary Co-Optimization
title_short Securing the Software Defined Perimeter with Evolutionary Co-Optimization
title_sort securing the software defined perimeter with evolutionary co optimization
url https://hdl.handle.net/1721.1/146195
work_keys_str_mv AT shlapentokhrothmanmichal securingthesoftwaredefinedperimeterwithevolutionarycooptimization
AT hembergerik securingthesoftwaredefinedperimeterwithevolutionarycooptimization
AT oreillyunamay securingthesoftwaredefinedperimeterwithevolutionarycooptimization