Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography.
Pedro IsasiJulio César Hernández CastroPublished in: Comput. Intell. (2004)
Keyphrases
- evolutionary computation
- computer security
- information security
- evolutionary algorithm
- genetic programming
- computational intelligence
- machine learning and data mining
- genetic algorithm
- intrusion detection
- computer systems
- fuzzy logic
- network security
- swarm intelligence
- fuzzy systems
- optimisation problems
- anomaly detection
- gene expression programming
- evolutionary design
- network intrusion detection
- evolutionary approaches
- information systems
- cooperative coevolution
- intrusion detection system
- fitness function
- continuous domains
- machine learning
- evolvable hardware
- nature inspired algorithms
- smart card
- e government
- fraud detection
- artificial life
- knowledge discovery
- search space
- fitness landscape
- knowledge base
- decision making
- data mining
- databases