A Genetic Programming approach for hardware-oriented hash functions for network security applications.
Mujtaba HassanArish SateesanJo VliegenStjepan PicekNele MentensPublished in: Appl. Soft Comput. (2024)
Keyphrases
- network security
- genetic programming
- hash functions
- intrusion detection
- similarity search
- computer networks
- traffic analysis
- intrusion detection system
- network traffic
- order preserving
- locality sensitive
- evolutionary computation
- real time
- security policies
- dos attacks
- information security
- security breaches
- anomaly detection
- risk assessment
- security protection
- evolutionary algorithm
- locality sensitive hashing
- genetic algorithm
- secret key
- computer systems
- nearest neighbor search
- block cipher
- data distribution
- hamming space
- hashing methods
- network management
- hamming distance
- situation assessment
- network administrators
- mobile agents
- anti phishing