Publisher
Springer International Publishing
Reference29 articles.
1. Kaspersky Lab.: Mobile malware evolution: 3 infection attempts per user in 2013.
http://www.kaspersky.com/about/news/virus/2014/Mobile-malware-evolution-3-infection-attempts-per-user-in-2013
2. Kayacık, H.G., Heywood, M.I., Zincir-Heywood, A.N.: On evolving buffer overflow attacks using genetic programming. In: Proceedings of the 8th Annual Conference on Genetic and Evolutionary Computation, pp. 1667–1674. ACM (2006)
3. Kayacık, H.G., Zincir-Heywood, A.N., Heywood, M.I., Burschka, S.: Generating mimicry attacks using genetic programming: a benchmarking study. In: Proceedings of IEEE Symposium on Computational Intelligence in Cyber Security, pp. 136–143 (2009)
4. Kayacık, H.G., Zincir-Heywood, A.N., Heywood, M.I.: Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race. Appl. Soft Comput. 11(7), 4366–4383 (2011)
5. Kayacık, H.G., Zincir-Heywood, A.N., Heywood, M.I.: Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing. Evol. Intel. 4(4), 243–266 (2011)
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献