ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
Latest Publications
TOTAL DOCUMENTS
11
(FIVE YEARS 0)
H-INDEX
3
(FIVE YEARS 0)
Published By IEEE
9781467358675
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Evolving indigestible codes: Fuzzing interpreters with genetic programming
2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
◽
10.1109/cicybs.2013.6597203
◽
2013
◽
Cited By ~ 2
Author(s):
Sanjay Rawat
◽
Fabien Duchene
◽
Roland Groz
◽
Jean-Luc Richier
Keyword(s):
Genetic Programming
Download Full-text
Resilient hybrid overlay model for smart grid: RHM for smart grid
2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
◽
10.1109/cicybs.2013.6597205
◽
2013
◽
Author(s):
Shubhalaxmi Kher
◽
Victor Nutt
◽
Dipankar Dasgupta
Keyword(s):
Smart Grid
◽
Overlay Model
Download Full-text
What defines an intruder? An intelligent approach
2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
◽
10.1109/cicybs.2013.6597202
◽
2013
◽
Author(s):
Hector M Lugo-Cordero
◽
Ratan K Guha
Keyword(s):
Intelligent Approach
Download Full-text
Indoor geo-fencing and access control for wireless networks
2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
◽
10.1109/cicybs.2013.6597198
◽
2013
◽
Cited By ~ 3
Author(s):
Hossein Rahimi
◽
A. Nur Zincir-Heywood
◽
Bharat Gadher
Keyword(s):
Wireless Networks
◽
Access Control
Download Full-text
[Front matter]
2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
◽
10.1109/cicybs.2013.6597197
◽
2013
◽
Download Full-text
Higher dimensional chaos for Audio encryption
2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
◽
10.1109/cicybs.2013.6597206
◽
2013
◽
Cited By ~ 3
Author(s):
S. Ganesh Babu
◽
P. Ilango
Keyword(s):
Higher Dimensional
◽
Audio Encryption
Download Full-text
Image visualization based malware detection
2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
◽
10.1109/cicybs.2013.6597204
◽
2013
◽
Cited By ~ 33
Author(s):
Kesav Kancherla
◽
Srinivas Mukkamala
Keyword(s):
Malware Detection
◽
Image Visualization
Download Full-text
A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing
2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
◽
10.1109/cicybs.2013.6597201
◽
2013
◽
Cited By ~ 22
Author(s):
Chirag N. Modi
◽
Dhiren Patel
Keyword(s):
Cloud Computing
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Hybrid Network
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Network Intrusion Detection System
Download Full-text
Applications of computational intelligence for static software checking against memory corruption vulnerabilities
2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
◽
10.1109/cicybs.2013.6597207
◽
2013
◽
Cited By ~ 3
Author(s):
Marcos Alvares
◽
Tshilidzi Marwala
◽
Fernando Buarque de Lima Neto
Keyword(s):
Computational Intelligence
Download Full-text
Evolving OWA operators for cyber security decision making problems
2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
◽
10.1109/cicybs.2013.6597200
◽
2013
◽
Cited By ~ 4
Author(s):
Simon Miller
◽
Jonathan M. Garibaldi
◽
Susan Appleby
Keyword(s):
Decision Making
◽
Cyber Security
◽
Owa Operators
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close