Author:
Aziz Amira Sayed A.,Azar Ahmad Taher,Hassanien Aboul Ella,Hanafy Sanaa El-Ola
Publisher
Springer International Publishing
Reference32 articles.
1. Haupt, R.L., Haupt, S.E.: Practical Genetic Algorithms. 2nd edn. Wiley, New York (2004)
2. Polhlheim, H.: Genetic and Evolutionary Algorithms: Principles, Methods and Algorithms. http://www.geatbx.com/docu/index.html (2006)
3. Whitley, D.: A genetic algorithm tutorial. Stat. Comput. 4, 65–85 (1994)
4. Owais, S., Snasel, V., Abraham, A.: Survey: using genetic algorithm approach in intrusion detection systems techniques, 7th computer information systems and industrial management applications. Ostrava 26–28, 300–307 (2008). doi: 10.1109/CISIM.2008.49
5. Li, W.: Using Genetic Algorithm for Network Intrusion Detection. Proceedings of the United States Department of Energy Cyber Security Group (2004)
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献