Securing the Software Defined Perimeter with Evolutionary Co-Optimization
Main Authors: | Shlapentokh-Rothman, Michal, Hemberg, Erik, O'Reilly, Una-May |
---|---|
Other Authors: | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory |
Format: | Article |
Language: | English |
Published: |
ACM|Genetic and Evolutionary Computation Conference Companion
2022
|
Online Access: | https://hdl.handle.net/1721.1/146195 |
Similar Items
-
Coevolutionary Modeling of Cyber Attack Patterns and Mitigations Using Public Datasets
by: Shlapentokh-Rothman, Michal, et al.
Published: (2022) -
Detecting tax evasion: a co-evolutionary approach
by: Rosen, Jacob, et al.
Published: (2016) -
CyberEvo: Evolutionary Search of Knowledge-based Behaviors in a Cyber Attack Campaign
by: Moskal, Stephen, et al.
Published: (2022) -
Using Large Language Models for Evolutionary Search
by: OREILLY, UNA-MAY, et al.
Published: (2024) -
Genetic Programming: A Tutorial Introduction
by: O'Reilly, Una-May, et al.
Published: (2023)