Login / Signup
Interpretation of Binary Strings as Security Protocols for their Evolution by means of Genetic Algorithms.
Luis Zarza
Josep Pegueroles
Miguel Soriano
Published in:
DEXA Workshops (2007)
Keyphrases
</>
binary strings
security protocols
genetic algorithm
hamming distance
automated design
encoding scheme
sequence data
fitness function
artificial immune algorithm
neural network
evolutionary computation
key management
low cost
pattern databases
security mechanisms
response time
high dimensional