暂无分享,去创建一个
[1] Kevin M. Carter,et al. Strategic evolution of adversaries against temporal platform diversity active cyber defenses , 2014, SpringSim.
[2] Zbigniew Michalewicz,et al. Genetic Algorithms + Data Structures = Evolution Programs , 1996, Springer Berlin Heidelberg.
[3] John H. Miller,et al. The coevolution of automata in the repeated Prisoner's Dilemma , 1996 .
[4] Richard Colbaugh,et al. Predictability-oriented defense against adaptive adversaries , 2012, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[5] William W. Streilein,et al. Finding Focus in the Blur of Moving-Target Techniques , 2014, IEEE Security & Privacy.
[6] Mathieu Bastian,et al. Gephi: An Open Source Software for Exploring and Manipulating Networks , 2009, ICWSM.
[7] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[8] Kevin M. Carter,et al. Quantitative Analysis of Active Cyber Defenses Based on Temporal Platform Diversity , 2014, ArXiv.
[9] William W. Streilein,et al. Survey of Cyber Moving Target Techniques , 2013 .
[10] Sabine Fenstermacher,et al. Genetic Algorithms Data Structures Evolution Programs , 2016 .
[11] Dorothea Heiss-Czedik,et al. An Introduction to Genetic Algorithms. , 1997, Artificial Life.
[12] Daniel Shawcross Wilkerson,et al. Winnowing: local algorithms for document fingerprinting , 2003, SIGMOD '03.
[13] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[14] U. Netlogo Wilensky,et al. Center for Connected Learning and Computer-Based Modeling , 1999 .