Genetic Programming Bibliography entries for Nur Zincir-Heywood

up to index Created by W.Langdon from gp-bibliography.bib Revision:1.8051

GP coauthors/coeditors: Riyad Alshammari, Peter Lichodzijewski, Malcolm Heywood, Aaron Atwater, Olivia Lucca Fraser, John T Jacobs, Fariba Haddadi, Hilmi Gunes Kayacik, Dylan Runkel, Stefan Burschka, Sara Khanchi, Ali Vahdat, Patrick LaRoche, Aimee Burrows, Duc C Le, Xiao Luo, Tokunbo Makanju, Evangelos E Milios, Gisele L Pappa, Anabela Simoes, Dirk Sudholt, William B Langdon, David Robert White, Justyna Petke, Frank William Moore, Jose Santos Reyes, Julia Handl, Amarda Shehu, David Walker, Richard Everson, Jonathan E Fieldsend, Karthik Kuber, Masaya Nakata, Kamran Shafi, John R Woodward, Daniel R Tauritz, Manuel Lopez-Ibanez, Stefan Wagner, Michael Affenzeller, Youhei Akimoto, Anne Auger, Dimo Brockhoff, Nikolaus Hansen, Olaf Mersmann, Petr Posik, Tea Tusar, Boris Naujoks, Abraham Prieto, Nicolas Bredeche, Evert Haasdijk, Chris Simons, Jerry Swan, Krzysztof Krawiec, James Smith, Colin G Johnson, Alberto Moraglio, Michael O'Neill, Stephen L Smith, Stefano Cagnoni, Robert M Patton, Markus Wagner, Maxim Buzdalov, Dejan Tusar, Tobias Wagner, Una-May O'Reilly, Erik Hemberg, Nicole Hoffman, Stephane Doncieux, Joshua E Auerbach, Richard Duro, Harold de Vladar, Vanessa Volz, Samadhi Nallaperuma, Frank Moore, Gunes Kayacik, Westley Weimer, Silvino Fernandez Alzueta Arcelor, Pablo Valledor, Thomas Stuetzle, Kuber Karthik, Shafi Kamran, Giovanni Squillero, Alberto Tonda, Peter A N Bosman, John A W McCall, Carola Doerr, Emma Hart, Gabriela Ochoa, Christine Zarges, Alma Rahat, Handing Wang, Yaochu Jin, Andrew R McIntyre, Robert J Smith, Dong Song, Robert Curry, Jillian Morgan, Ryan J Urbanowicz, Danilo Vasconcellos Vargas, Silvino Fernandez Alzueta, Pablo Valledor Pellicer, Mostafa M Hashim Ellabaan, Frank Neumann, Paul Kaufmann, Oliver Kramer, P G M Baltus, Giovanni Iacca, M N Andraud, Anna Esparcia-Alcazar, Nadarajen Veerapen, Fabio Daolio, Arnaud Liefooghe, Sebastien Verel, Dirk Thierens, William La Cava, Randal Olson, Patryk Orzechowski, Ernesto Tarantino, Ivanoe De Falco, Antonio Della Cioppa, Umberto Scafuri, Heiko Hamann, Jared Moore, Anthony Clark, Bogdan Filipic, Zachary Wilkins, Zhilei Zhou, Ziyu Qiu, Brad Niblett, Andrew Johnston, Jeffrey Schwartzentruber,

Genetic Programming Articles by Nur Zincir-Heywood

  1. Sara Khanchi and Ali Vahdat and Malcolm I. Heywood and A. Nur Zincir-Heywood. On botnet detection with genetic programming under streaming data label budgets and class imbalance. Swarm and Evolutionary Computation, 39:123-140, 2018. details

  2. Riyad Alshammari and A. Nur Zincir-Heywood. Identification of VoIP encrypted traffic using a machine learning approach. Journal of King Saud University - Computer and Information Sciences, 27(1):77-92, 2015. details

  3. Hilmi Gunes Kayacik and A. Nur Zincir-Heywood and Malcolm I. Heywood. Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing. Evolutionary Intelligence, 4(4):243-266, 2011. details

  4. Hilmi Gunes Kayacik and A. Nur Zincir-Heywood and Malcolm I. Heywood. Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race. Applied Soft Computing, 11(7):4366-4383, 2011. details

  5. Dong Song and Malcolm I. Heywood and A. Nur Zincir-Heywood. Training genetic programming on half a million patterns: an example from anomaly detection. IEEE Transactions on Evolutionary Computation, 9(3):225-239, 2005. details

  6. M. I. Heywood and A. N. Zincir-Heywood. Dynamic Page Based Crossover in Linear Genetic Programming. IEEE Transactions on Systems, Man, and Cybernetics: Part B - Cybernetics, 32(3):380-388, 2002. details

Genetic Programming Conference proceedings edited by Nur Zincir-Heywood

Genetic Programming conference papers by Nur Zincir-Heywood

  1. Zhilei Zhou and Nur Zincir-Heywood and Malcolm I. Heywood. Simple Efficient Evolutionary Ensemble Learning on Network Intrusion Detection Benchmarks. In Stephen Smith and Joao Correia and Christian Cintrano editors, 27th International Conference, EvoApplications 2024, volume 14634, pages 361-376, Aberystwyth, 2024. Springer. details

  2. Zhilei Zhou and Ziyu Qiu and Brad Niblett and Andrew Johnston and Jeffrey Schwartzentruber and Nur Zincir-Heywood and Malcolm Heywood. A Boosting Approach to Constructing an Ensemble Stack. In Gisele Pappa and Mario Giacobini and Zdenek Vasicek editors, EuroGP 2023: Proceedings of the 26th European Conference on Genetic Programming, volume 13986, pages 133-148, Brno, Czech Republic, 2023. Springer Verlag. details

  3. Zachary Wilkins and Nur Zincir-Heywood. Darwinian malware detectors: a comparison of evolutionary solutions to android malware. In Richard Allmendinger and Carlos Cotta and Carola Doerr and Pietro S. Oliveto and Thomas Weise and Ales Zamuda and Anne Auger and Dimo Brockhoff and Nikolaus Hansen and Tea Tusar and Konstantinos Varelas and David Camacho-Fernandez and Massimiliano Vasile and Annalisa Riccardi and Bilel Derbel and Ke Li and Xiaodong Li and Saul Zapotecas and Qingfu Zhang and Ozgur Akman and Khulood Alyahya and Juergen Branke and Jonathan Fieldsend and Tinkle Chugh and Jussi Hakanen and Josu Ceberio Uribe and Valentino Santucci and Marco Baioletti and John McCall and Emma Hart and Daniel R. Tauritz and John R. Woodward and Koichi Nakayama and Chika Oshima and Stefan Wagner and Michael Affenzeller and Eneko Osaba and Javier Del Ser and Pascal Kerschke and Boris Naujoks and Vanessa Volz and Anna I Esparcia-Alcazar and Riyad Alshammari and Erik Hemberg and Tokunbo Makanju and Brad Alexander and Saemundur O. Haraldsson and Markus Wagner and Silvino Fernandez Alzueta and Pablo Valledor Pellicer and Thomas Stuetzle and David Walker and Matt Johns and Nick Ross and Ed Keedwell and Masaya Nakata and Anthony Stein and Takato Tatsumi and Nadarajen Veerapen and Arnaud Liefooghe and Sebastien Verel and Gabriela Ochoa and Stephen Smith and Stefano Cagnoni and Robert M. Patton and William La Cava and Randal Olson and Patryk Orzechowski and Ryan Urbanowicz and Akira Oyama and Koji Shimoyama and Hemant Kumar Singh and Kazuhisa Chiba and Pramudita Satria Palar and Alma Rahat and Richard Everson and Handing Wang and Yaochu Jin and Marcus Gallagher and Mike Preuss and Olivier Teytaud and Fernando Lezama and Joao Soares and Zita Vale editors, GECCO '19: Proceedings of the Genetic and Evolutionary Computation Conference Companion, pages 1651-1658, Prague, Czech Republic, 2019. ACM. details

  4. Duc C. Le and A. Nur Zincir-Heywood and Malcolm I. Heywood. Dynamic Insider Threat Detection Based on Adaptable Genetic Programming. In 2019 IEEE Symposium Series on Computational Intelligence (SSCI), pages 2579-2586, 2019. details

  5. Duc C. Le and Malcolm I. Heywood and Nur Zincir-Heywood. Benchmarking genetic programming in dynamic insider threat detection. In Richard Allmendinger and Carlos Cotta and Carola Doerr and Pietro S. Oliveto and Thomas Weise and Ales Zamuda and Anne Auger and Dimo Brockhoff and Nikolaus Hansen and Tea Tusar and Konstantinos Varelas and David Camacho-Fernandez and Massimiliano Vasile and Annalisa Riccardi and Bilel Derbel and Ke Li and Xiaodong Li and Saul Zapotecas and Qingfu Zhang and Ozgur Akman and Khulood Alyahya and Juergen Branke and Jonathan Fieldsend and Tinkle Chugh and Jussi Hakanen and Josu Ceberio Uribe and Valentino Santucci and Marco Baioletti and John McCall and Emma Hart and Daniel R. Tauritz and John R. Woodward and Koichi Nakayama and Chika Oshima and Stefan Wagner and Michael Affenzeller and Eneko Osaba and Javier Del Ser and Pascal Kerschke and Boris Naujoks and Vanessa Volz and Anna I Esparcia-Alcazar and Riyad Alshammari and Erik Hemberg and Tokunbo Makanju and Brad Alexander and Saemundur O. Haraldsson and Markus Wagner and Silvino Fernandez Alzueta and Pablo Valledor Pellicer and Thomas Stuetzle and David Walker and Matt Johns and Nick Ross and Ed Keedwell and Masaya Nakata and Anthony Stein and Takato Tatsumi and Nadarajen Veerapen and Arnaud Liefooghe and Sebastien Verel and Gabriela Ochoa and Stephen Smith and Stefano Cagnoni and Robert M. Patton and William La Cava and Randal Olson and Patryk Orzechowski and Ryan Urbanowicz and Akira Oyama and Koji Shimoyama and Hemant Kumar Singh and Kazuhisa Chiba and Pramudita Satria Palar and Alma Rahat and Richard Everson and Handing Wang and Yaochu Jin and Marcus Gallagher and Mike Preuss and Olivier Teytaud and Fernando Lezama and Joao Soares and Zita Vale editors, GECCO '19: Proceedings of the Genetic and Evolutionary Computation Conference Companion, pages 385-386, Prague, Czech Republic, 2019. ACM. details

  6. Duc C. Le and Nur Zincir-Heywood. Learning From Evolving Network Data for Dependable Botnet Detection. In 2019 15th International Conference on Network and Service Management (CNSM), 2019. details

  7. Sara Khanchi and Nur Zincir-Heywood and Malcolm Heywood. Streaming Botnet traffic analysis using bio-inspired active learning. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium, 2018. details

  8. Sara Khanchi and Malcolm I. Heywood and A. Nur Zincir-Heywood. Properties of a GP active learning framework for streaming data with class imbalance. In Proceedings of the Genetic and Evolutionary Computation Conference Companion, pages 945-952, Berlin, Germany, 2017. ACM. details

  9. Olivia Lucca Fraser and Nur Zincir-Heywood and Malcolm Heywood and John T. Jacobs. Return-oriented Programme Evolution with ROPER: A Proof of Concept. In Proceedings of the Genetic and Evolutionary Computation Conference Companion, pages 1447-1454, Berlin, Germany, 2017. ACM. details

  10. Sara Khanchi and Malcolm Iain Heywood and Nur Zincir-Heywood. On the Impact of Class Imbalance in GP Streaming Classification with Label Budgets. In Malcolm I. Heywood and James McDermott and Mauro Castelli and Ernesto Costa and Kevin Sim editors, EuroGP 2016: Proceedings of the 19th European Conference on Genetic Programming, volume 9594, pages 35-50, Porto, Portugal, 2016. Springer Verlag. details

  11. Robert J. Smith and Ayse Nur Zincir-Heywood and Malcolm I. Heywood and John T. Jacobs. Initiating a Moving Target Network Defense with a Real-time Neuro-evolutionary Detector. In Tobias Friedrich and Frank Neumann and Andrew M. Sutton and Martin Middendorf and Xiaodong Li and Emma Hart and Mengjie Zhang and Youhei Akimoto and Peter A. N. Bosman and Terry Soule and Risto Miikkulainen and Daniele Loiacono and Julian Togelius and Manuel Lopez-Ibanez and Holger Hoos and Julia Handl and Faustino Gomez and Carlos M. Fonseca and Heike Trautmann and Alberto Moraglio and William F. Punch and Krzysztof Krawiec and Zdenek Vasicek and Thomas Jansen and Jim Smith and Simone Ludwig and JJ Merelo and Boris Naujoks and Enrique Alba and Gabriela Ochoa and Simon Poulding and Dirk Sudholt and Timo Koetzing editors, GECCO '16 Companion: Proceedings of the Companion Publication of the 2016 Annual Conference on Genetic and Evolutionary Computation, pages 1095-1102, Denver, Colorado, USA, 2016. ACM. details

  12. Ali Vahdat and Jillian Morgan and Andrew R. McIntyre and Malcolm I. Heywood and A. Nur Zincir-Heywood. Tapped Delay Lines for GP Streaming Data Classification with Label Budgets. In Penousal Machado and Malcolm I. Heywood and James McDermott and Mauro Castelli and Pablo Garcia-Sanchez and Paolo Burelli and Sebastian Risi and Kevin Sim editors, 18th European Conference on Genetic Programming, volume 9025, pages 126-138, Copenhagen, 2015. Springer. details

  13. Fariba Haddadi and A. Nur Zincir-Heywood. Botnet Detection System Analysis on the Effect of Botnet Evolution and Feature Representation. In Frank W. Moore and Nur Zincir-Heywood editors, SecDef'2015 - Workshop on genetic and evolutionary computation in defense, security and risk management, pages 893-900, Madrid, Spain, 2015. ACM. details

  14. Fariba Haddadi and Dylan Runkel and A. Nur Zincir-Heywood and Malcolm I. Heywood. On botnet behaviour analysis using GP and C4.5. In Anna I Esparcia-Alcazar and Frank W. Moore editors, GECCO 2014 Workshop on genetic and evolutionary computation in defense, security and risk management (SecDef), pages 1253-1260, Vancouver, BC, Canada, 2014. ACM. details

  15. Sara Rahimi and Andrew R. McIntyre and Malcolm I. Heywood and Nur Zincir-Heywood. Label free change detection on streaming data with cooperative multi-objective genetic programming. In Christian Blum and Enrique Alba and Thomas Bartz-Beielstein and Daniele Loiacono and Francisco Luna and Joern Mehnen and Gabriela Ochoa and Mike Preuss and Emilia Tantar and Leonardo Vanneschi and Kent McClymont and Ed Keedwell and Emma Hart and Kevin Sim and Steven Gustafson and Ekaterina Vladislavleva and Anne Auger and Bernd Bischl and Dimo Brockhoff and Nikolaus Hansen and Olaf Mersmann and Petr Posik and Heike Trautmann and Muhammad Iqbal and Kamran Shafi and Ryan Urbanowicz and Stefan Wagner and Michael Affenzeller and David Walker and Richard Everson and Jonathan Fieldsend and Forrest Stonedahl and William Rand and Stephen L. Smith and Stefano Cagnoni and Robert M. Patton and Gisele L. Pappa and John Woodward and Jerry Swan and Krzysztof Krawiec and Alexandru-Adrian Tantar and Peter A. N. Bosman and Miguel Vega-Rodriguez and Jose M. Chaves-Gonzalez and David L. Gonzalez-Alvarez and Sergio Santander-Jimenez and Lee Spector and Maarten Keijzer and Kenneth Holladay and Tea Tusar and Boris Naujoks editors, GECCO '13 Companion: Proceeding of the fifteenth annual conference companion on Genetic and evolutionary computation conference companion, pages 159-160, Amsterdam, The Netherlands, 2013. ACM. details

  16. Patrick LaRoche and Aimee Burrows and A. Nur Zincir-Heywood. How far an Evolutionary Approach can go for Protocol State Analysis and Discovery. In Luis Gerardo de la Fraga editor, 2013 IEEE Conference on Evolutionary Computation, volume 1, pages 3228-3235, Cancun, Mexico, 2013. details

  17. Fariba Haddadi and H. Gunes Kayacik and A. Nur Zincir-Heywood and Malcolm I. Heywood. Malicious Automatically Generated Domain Name Detection Using Stateful-SBB. In Anna I. Esparcia-Alcazar and Antonio Della Cioppa and Ivanoe De Falco and Ernesto Tarantino and Carlos Cotta and Robert Schaefer and Konrad Diwold and Kyrre Glette and Andrea Tettamanzi and Alexandros Agapitos and Paolo Burrelli and J. J. Merelo and Stefano Cagnoni and Mengjie Zhang and Neil Urquhart and Kevin Sim and Aniko Ekart and Francisco Fernandez de Vega and Sara Silva and Evert Haasdijk and Gusz Eiben and Anabela Simoes and Philipp Rohlfshagen editors, Applications of Evolutionary Computing, EvoApplications 2013: EvoCOMNET, EvoCOMPLEX, EvoENERGY, EvoFIN, EvoGAMES, EvoIASP, EvoINDUSTRY, EvoNUM, EvoPAR, EvoRISK, EvoROBOT, EvoSTOC, volume 7835, pages 529-539, Vienna, 2013. Springer Verlag. details

  18. Fariba Haddadi and A. Nur Zincir-Heywood. Analyzing String Format-Based Classifiers For Botnet Detection: GP and SVM. In Luis Gerardo de la Fraga editor, 2013 IEEE Conference on Evolutionary Computation, volume 1, pages 2626-2633, Cancun, Mexico, 2013. details

  19. Patrick LaRoche and A. Nur Zincir-Heywood and Malcolm I. Heywood. Protocol Discovery and Analysis via Live Interaction. In Cecilia Di Chio and Alexandros Agapitos and Stefano Cagnoni and Carlos Cotta and F. Fernandez de Vega and Gianni A. Di Caro and Rolf Drechsler and Aniko Ekart and Anna I Esparcia-Alcazar and Muddassar Farooq and William B. Langdon and Juan J. Merelo and Mike Preuss and Hendrik Richter and Sara Silva and Anabela Simoes and Giovanni Squillero and Ernesto Tarantino and Andrea G. B. Tettamanzi and Julian Togelius and Neil Urquhart and A. Sima Uyar and Georgios N. Yannakakis editors, Applications of Evolutionary Computing, EvoApplications2012: EvoCOMNET, EvoCOMPLEX, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoNUM, EvoPAR, EvoRISK, EvoSTIM, EvoSTOC, volume 7248, pages 11-20, Malaga, Spain, 2012. Springer Verlag. details

  20. Aaron Atwater and Malcolm I. Heywood and Nur Zincir-Heywood. GP under streaming data constraints: a case for pareto archiving?. In Terry Soule and Anne Auger and Jason Moore and David Pelta and Christine Solnon and Mike Preuss and Alan Dorin and Yew-Soon Ong and Christian Blum and Dario Landa Silva and Frank Neumann and Tina Yu and Aniko Ekart and Will Browne and Tim Kovacs and Man-Leung Wong and Clara Pizzuti and Jon Rowe and Tobias Friedrich and Giovanni Squillero and Nicolas Bredeche and Stephen L. Smith and Alison Motsinger-Reif and Jose Lozano and Martin Pelikan and Silja Meyer-Nienberg and Christian Igel and Greg Hornby and Rene Doursat and Steve Gustafson and Gustavo Olague and Shin Yoo and John Clark and Gabriela Ochoa and Gisele Pappa and Fernando Lobo and Daniel Tauritz and Jurgen Branke and Kalyanmoy Deb editors, GECCO '12: Proceedings of the fourteenth international conference on Genetic and evolutionary computation conference, pages 703-710, Philadelphia, Pennsylvania, USA, 2012. ACM. details

  21. Patrick LaRoche and A. Nur Zincir-Heywood and Malcolm I. Heywood. Exploring the state space of an application protocol: A case study of SMTP. In IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2011), pages 152-159, Paris, 2011. details

  22. Riyad Alshammari and A. Nur Zincir-Heywood. Is Machine Learning losing the battle to produce transportable signatures against VoIP traffic?. In Alice E. Smith editor, Proceedings of the 2011 IEEE Congress on Evolutionary Computation, pages 1542-1549, New Orleans, USA, 2011. IEEE Press. details

  23. Patrick LaRoche and Nur Zincir-Heywood and Malcolm Heywood. Using Code Bloat to Obfuscate Evolved Network Traffic. In Cecilia Di Chio and Anthony Brabazon and Gianni A. Di Caro and Marc Ebner and Muddassar Farooq and Andreas Fink and Jorn Grahl and Gary Greenfield and Penousal Machado and Michael O'Neill and Ernesto Tarantino and Neil Urquhart editors, EvoCOMNET, volume 6025, pages 101-110, Istanbul, 2010. Springer. details

  24. Riyad Alshammari and A. Nur Zincir-Heywood. Unveiling Skype encrypted tunnels using GP. In IEEE Congress on Evolutionary Computation (CEC 2010), Barcelona, Spain, 2010. IEEE Press. details

  25. Riyad Alshammari and A. Nur Zincir-Heywood. An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype. In 2010 International Conference on Network and Service Management (CNSM), pages 310-313, 2010. details

  26. Patrick LaRoche and Nur Zincir-Heywood and Malcolm I. Heywood. Evolving TCP/IP packets: A case study of port scans. In IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, pages 1-8, 2009. details

  27. H. Gunes Kayacik and A. Nur Zincir-Heywood and Malcolm I. Heywood and Stefan Burschka. Generating mimicry attacks using genetic programming: A benchmarking study. In IEEE Symposium on Computational Intelligence in Cyber Security, CICS '09, pages 136-143, 2009. details

  28. Riyad Alshammari and Peter Lichodzijewski and Malcolm I. Heywood and A. Nur Zincir-Heywood. Classifying SSH encrypted traffic with minimum packet header features using genetic programming. In Anna I. Esparcia and Ying-ping Chen and Gabriela Ochoa and Ender Ozcan and Marc Schoenauer and Anne Auger and Hans-Georg Beyer and Nikolaus Hansen and Steffen Finck and Raymond Ros and Darrell Whitley and Garnett Wilson and Simon Harding and W. B. Langdon and Man Leung Wong and Laurence D. Merkle and Frank W. Moore and Sevan G. Ficici and William Rand and Rick Riolo and Nawwaf Kharma and William R. Buckley and Julian Miller and Kenneth Stanley and Jaume Bacardit and Will Browne and Jan Drugowitsch and Nicola Beume and Mike Preuss and Stephen L. Smith and Stefano Cagnoni and Jim DeLeo and Alexandru Floares and Aaron Baughman and Steven Gustafson and Maarten Keijzer and Arthur Kordon and Clare Bates Congdon and Laurence D. Merkle and Frank W. Moore editors, GECCO-2009 Defense applications of computational intelligence workshop, pages 2539-2546, Montreal, 2009. ACM. details

  29. Adetokunbo Makanju and A. Nur Zincir-Heywood and Evangelos E. Milios. Adaptabilty of a GP Based IDS on Wireless Networks. In Third International Conference on Availability, Reliability and Security, ARES 08, pages 310-318, 2008. details

  30. H. Gunes Kayacik and Malcolm Iain Heywood and A. Nur Zincir-Heywood. Evolving Buffer Overflow Attacks with Detector Feedback. In Mario Giacobini and Anthony Brabazon and Stefano Cagnoni and Gianni A. Di Caro and Rolf Drechsler and Muddassar Farooq and Andreas Fink and Evelyne Lutton and Penousal Machado and Stefan Minner and Michael O'Neill and Juan Romero and Franz Rothlauf and Giovanni Squillero and Hideyuki Takagi and A. Sima Uyar and Shengxiang Yang editors, Applications of Evolutionary Computing, EvoWorkshops2007: EvoCOMNET, EvoFIN, EvoIASP, EvoInteraction, EvoMUSART, EvoSTOC, EvoTransLog, volume 4448, pages 11-20, Valencia, Spain, 2007. Springer Verlag. details

  31. Xiao Luo and Nur Zincir-Heywood. Incorporating Temporal Information for Document Classification. In 2007 IEEE 23rd International Conference on Data Engineering Workshop, pages 780-789, Istanbul, Turkey, 2007. IEEE. details

  32. H. Gunes Kayacik and A. Nur Zincir-Heywood and Malcolm I. Heywood. Automatically Evading IDS using GP Authored Attacks. In IEEE Symposium on computational Intelligence in Security and Defense Applications, pages 153-160, Honolulu, 2007. IEEE Press. details

  33. Patrick LaRoche and A. Nur Zincir-Heywood. 802.11 De-authentication Attack Detection using Genetic Programming. In Pierre Collet and Marco Tomassini and Marc Ebner and Steven Gustafson and Anik\'o Ek\'art editors, Proceedings of the 9th European Conference on Genetic Programming, volume 3905, pages 1-12, Budapest, Hungary, 2006. Springer. details

  34. Xiao Luo and A. Nur Zincir-Heywood. Evolving Recurrent Linear-GP for Document Classification and Word Tracking. In Gary G. Yen and Lipo Wang and Piero Bonissone and Simon M. Lucas editors, Proceedings of the 2006 IEEE Congress on Evolutionary Computation, pages 8605-8612, Vancouver, 2006. IEEE Press. details

  35. Hilmi Gunes Kayacik and Malcolm Heywood and Nur Zincir-Heywood. On evolving buffer overflow attacks using genetic programming. In Maarten Keijzer and Mike Cattolico and Dirk Arnold and Vladan Babovic and Christian Blum and Peter Bosman and Martin V. Butz and Carlos Coello Coello and Dipankar Dasgupta and Sevan G. Ficici and James Foster and Arturo Hernandez-Aguirre and Greg Hornby and Hod Lipson and Phil McMinn and Jason Moore and Guenther Raidl and Franz Rothlauf and Conor Ryan and Dirk Thierens editors, GECCO 2006: Proceedings of the 8th annual conference on Genetic and evolutionary computation, volume 2, pages 1667-1674, Seattle, Washington, USA, 2006. ACM Press. details

  36. Patrick LaRoche and A. Nur Zincir-Heywood. Genetic Programming Based WiFi Data Link Layer Attack Detection. In 4th Annual Communication Networks and Services Research Conference (CNSR'06), pages 285-292, 2006. IEEE Computer Society. details

  37. Peter Lichodzijewski and Malcolm I. Heywood and A. Nur Zincir-Heywood. CasGP: Building Cascaded Hierarchical Models Using Niching. In David Corne and Zbigniew Michalewicz and Marco Dorigo and Gusz Eiben and David Fogel and Carlos Fonseca and Garrison Greenwood and Tan Kay Chen and Guenther Raidl and Ali Zalzala and Simon Lucas and Ben Paechter and Jennifier Willies and Juan J. Merelo Guervos and Eugene Eberbach and Bob McKay and Alastair Channon and Ashutosh Tiwari and L. Gwenn Volkert and Dan Ashlock and Marc Schoenauer editors, Proceedings of the 2005 IEEE Congress on Evolutionary Computation, volume 2, pages 1180-1187, Edinburgh, UK, 2005. IEEE Press. details

  38. Patrick LaRoche and A. Nur Zincir-Heywood. 802.11 Network Intrusion Detection using Genetic Programming. In Franz Rothlauf and Misty Blowers and J\"urgen Branke and Stefano Cagnoni and Ivan I. Garibay and Ozlem Garibay and J\"orn Grahl and Gregory Hornby and Edwin D. de Jong and Tim Kovacs and Sanjeev Kumar and Claudio F. Lima and Xavier Llor\`a and Fernando Lobo and Laurence D. Merkle and Julian Miller and Jason H. Moore and Michael O'Neill and Martin Pelikan and Terry P. Riopka and Marylyn D. Ritchie and Kumara Sastry and Stephen L. Smith and Hal Stringer and Keiki Takadama and Marc Toussaint and Stephen C. Upton and Alden H. Wright editors, Genetic and Evolutionary Computation Conference (GECCO2005) workshop program, pages 170-171, Washington, D.C., USA, 2005. ACM Press. details

  39. Xiao Luo and Malcolm I. Heywood and A. Nur Zincir-Heywood. Evolving recurrent models using linear GP. In Hans-Georg Beyer and Una-May O'Reilly and Dirk V. Arnold and Wolfgang Banzhaf and Christian Blum and Eric W. Bonabeau and Erick Cantu-Paz and Dipankar Dasgupta and Kalyanmoy Deb and James A. Foster and Edwin D. de Jong and Hod Lipson and Xavier Llora and Spiros Mancoridis and Martin Pelikan and Guenther R. Raidl and Terence Soule and Andy M. Tyrrell and Jean-Paul Watson and Eckart Zitzler editors, GECCO 2005: Proceedings of the 2005 conference on Genetic and evolutionary computation, volume 2, pages 1787-1788, Washington DC, USA, 2005. ACM Press. details

  40. H. Gunes Kayacyk and A. Nur Zincir-Heywood and Malcolm Heywood. Evolving Successful Stack Overflow Attacks for Vulnerability Testing. In 21st Annual Computer Security Applications Conference (ACSAC'05), pages 225-234, 2005. IEEE Computer Society. details

  41. D. Song and R. Curry and M. I. Heywood and A. N. Zincir-Heywood. On the Efficient Mining of Network Audit Data using Genetic Programming. In R. Poli and S. Cagnoni and M. Keijzer and E. Costa and F. Pereira and G. Raidl and S. C. Upton and D. Goldberg and H. Lipson and E. de Jong and J. Koza and H. Suzuki and H. Sawai and I. Parmee and M. Pelikan and K. Sastry and D. Thierens and W. Stolzmann and P. L. Lanzi and S. W. Wilson and M. O'Neill and C. Ryan and T. Yu and J. F. Miller and I. Garibay and G. Holifield and A. S. Wu and T. Riopka and M. M. Meysenburg and A. W. Wright and N. Richter and J. H. Moore and M. D. Ritchie and L. Davis and R. Roy and M. Jakiela editors, GECCO 2004 Workshop Proceedings, Seattle, Washington, USA, 2004. details

  42. Peter Lichodzijewski and Nur Zincir-Heywood and Malcolm Heywood. Cascaded GP Models for Data Mining. In Proceedings of the 2004 IEEE Congress on Evolutionary Computation, pages 2258-2264, Portland, Oregon, 2004. IEEE Press. details

  43. Dong Song and Malcolm I. Heywood and A. Nur Zincir-Heywood. A Linear Genetic Programming Approach to Intrusion Detection. In E. Cant\'u-Paz and J. A. Foster and K. Deb and D. Davis and R. Roy and U.-M. O'Reilly and H.-G. Beyer and R. Standish and G. Kendall and S. Wilson and M. Harman and J. Wegener and D. Dasgupta and M. A. Potter and A. C. Schultz and K. Dowsland and N. Jonoska and J. Miller editors, Genetic and Evolutionary Computation -- GECCO-2003, volume 2724, pages 2325-2336, Chicago, 2003. Springer-Verlag. details

  44. M. I. Heywood and A. N. Zincir-Heywood. Register Based Genetic Programming on FPGA Computing Platforms. In Riccardo Poli and Wolfgang Banzhaf and William B. Langdon and Julian F. Miller and Peter Nordin and Terence C. Fogarty editors, Genetic Programming, Proceedings of EuroGP'2000, volume 1802, pages 44-59, Edinburgh, 2000. Springer-Verlag. details

  45. M. I. Heywood and A. N. Zincir-Heywood. Page-based linear genetic programming. In Systems, Man, and Cybernetics, 2000 IEEE International Conference, volume 5, pages 3823-3828, Nashville, TN, USA, 2000. IEEE Press. details

Genetic Programming book chapters by Nur Zincir-Heywood

Genetic Programming other entries for Nur Zincir-Heywood