Benchmarking evolutionary computation approaches to insider threat detection.
Duc C. LeSara KhanchiA. Nur Zincir-HeywoodMalcolm I. HeywoodPublished in: GECCO (2018)
Keyphrases
- evolutionary computation
- evolutionary algorithm
- genetic programming
- computational intelligence
- swarm intelligence
- evolutionary approaches
- genetic algorithm
- machine learning and data mining
- fitness function
- fuzzy logic
- neural network
- insider threat
- fitness landscape
- monitoring system
- fuzzy sets
- soft computing
- database systems
- decision making