Genetic Programming Bibliography entries for Nur Zincir-Heywood

up to index Created by W.Langdon from gp-bibliography.bib Revision:1.3838

GP coauthors/coeditors: Riyad Alshammari, Peter Lichodzijewski, Malcolm Heywood, Aaron Atwater, Olivia Lucca Fraser, John T Jacobs, Fariba Haddadi, Hilmi Gunes Kayacik, Dylan Runkel, Stefan Burschka, Sara Khanchi, Patrick LaRoche, Aimee Burrows, Xiao Luo, Tokunbo Makanju, Evangelos E Milios, Gisele L Pappa, Anabela Simoes, Dirk Sudholt, William B Langdon, David Robert White, Justyna Petke, Frank William Moore, Jose Santos, Julia Handl, Amarda Shehu, David Walker, Richard Everson, Jonathan E Fieldsend, Karthik Kuber, Masaya Nakata, Kamran Shafi, John R Woodward, Daniel R Tauritz, Manuel Lopez-Ibanez, Stefan Wagner, Michael Affenzeller, Youhei Akimoto, Anne Auger, Dimo Brockhoff, Nikolaus Hansen, Olaf Mersmann, Petr Posik, Tea Tusar, Boris Naujoks, Abraham Prieto, Nicolas Bredeche, Evert Haasdijk, Chris Simons, Jerry Swan, Krzysztof Krawiec, James Smith, Colin G Johnson, Alberto Moraglio, Michael O'Neill, Stephen L Smith, Stefano Cagnoni, Robert M Patton, Sara Rahimi, Andrew R McIntyre, Robert J Smith, Dong Song, Robert Curry, Ali Vahdat, Jillian Morgan,

Genetic Programming Articles by Nur Zincir-Heywood

  1. Riyad Alshammari and A. Nur Zincir-Heywood. Identification of VoIP encrypted traffic using a machine learning approach. Journal of King Saud University - Computer and Information Sciences, 27(1):77-92, 2015. details

  2. Hilmi Gunes Kayacik and A. Nur Zincir-Heywood and Malcolm I. Heywood. Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing. Evolutionary Intelligence, 4(4):243-266, 2011. details

  3. Hilmi Gunes Kayacik and A. Nur Zincir-Heywood and Malcolm I. Heywood. Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race. Applied Soft Computing, 11(7):4366-4383, 2011. details

  4. Dong Song and Malcolm I. Heywood and A. Nur Zincir-Heywood. Training genetic programming on half a million patterns: an example from anomaly detection. IEEE Transactions on Evolutionary Computation, 9(3):225-239, 2005. details

  5. M. I. Heywood and A. N. Zincir-Heywood. Dynamic Page Based Crossover in Linear Genetic Programming. IEEE Transactions on Systems, Man, and Cybernetics: Part B - Cybernetics, 32(3):380-388, 2002. details

Genetic Programming Conference proceedings edited by Nur Zincir-Heywood

Genetic Programming conference papers by Nur Zincir-Heywood

  1. Olivia Lucca Fraser and Nur Zincir-Heywood and Malcolm Heywood and John T. Jacobs. Return-oriented Programme Evolution with ROPER: A Proof of Concept. In Proceedings of the Genetic and Evolutionary Computation Conference Companion, pages 1447-1454, Berlin, Germany, 2017. ACM. details

  2. Sara Khanchi and Malcolm Iain Heywood and Nur Zincir-Heywood. On the Impact of Class Imbalance in GP Streaming Classification with Label Budgets. In Malcolm I. Heywood and James McDermott and Mauro Castelli and Ernesto Costa and Kevin Sim editors, EuroGP 2016: Proceedings of the 19th European Conference on Genetic Programming, volume 9594, pages 35-50, Porto, Portugal, 2016. Springer Verlag. details

  3. Robert J. Smith and Ayse Nur Zincir-Heywood and Malcolm I. Heywood and John T. Jacobs. Initiating a Moving Target Network Defense with a Real-time Neuro-evolutionary Detector. In Tobias Friedrich and Frank Neumann and Andrew M. Sutton and Martin Middendorf and Xiaodong Li and Emma Hart and Mengjie Zhang and Youhei Akimoto and Peter A. N. Bosman and Terry Soule and Risto Miikkulainen and Daniele Loiacono and Julian Togelius and Manuel Lopez-Ibanez and Holger Hoos and Julia Handl and Faustino Gomez and Carlos M. Fonseca and Heike Trautmann and Alberto Moraglio and William F. Punch and Krzysztof Krawiec and Zdenek Vasicek and Thomas Jansen and Jim Smith and Simone Ludwig and JJ Merelo and Boris Naujoks and Enrique Alba and Gabriela Ochoa and Simon Poulding and Dirk Sudholt and Timo Koetzing editors, GECCO '16 Companion: Proceedings of the Companion Publication of the 2016 Annual Conference on Genetic and Evolutionary Computation, pages 1095-1102, Denver, Colorado, USA, 2016. ACM. details

  4. Ali Vahdat and Jillian Morgan and Andrew R. McIntyre and Malcolm I. Heywood and A. Nur Zincir-Heywood. Tapped Delay Lines for GP Streaming Data Classification with Label Budgets. In Penousal Machado and Malcolm I. Heywood and James McDermott and Mauro Castelli and Pablo Garcia-Sanchez and Paolo Burelli and Sebastian Risi and Kevin Sim editors, 18th European Conference on Genetic Programming, volume 9025, pages 126-138, Copenhagen, 2015. Springer. details

  5. Fariba Haddadi and A. Nur Zincir-Heywood. Botnet Detection System Analysis on the Effect of Botnet Evolution and Feature Representation. In Frank W. Moore and Nur Zincir-Heywood editors, SecDef'2015 - Workshop on genetic and evolutionary computation in defense, security and risk management, pages 893-900, Madrid, Spain, 2015. ACM. details

  6. Fariba Haddadi and Dylan Runkel and A. Nur Zincir-Heywood and Malcolm I. Heywood. On botnet behaviour analysis using GP and C4.5. In Anna I Esparcia-Alcazar and Frank W. Moore editors, GECCO 2014 Workshop on genetic and evolutionary computation in defense, security and risk management (SecDef), pages 1253-1260, Vancouver, BC, Canada, 2014. ACM. details

  7. Sara Rahimi and Andrew R. McIntyre and Malcolm I. Heywood and Nur Zincir-Heywood. Label free change detection on streaming data with cooperative multi-objective genetic programming. In Christian Blum and Enrique Alba and Thomas Bartz-Beielstein and Daniele Loiacono and Francisco Luna and Joern Mehnen and Gabriela Ochoa and Mike Preuss and Emilia Tantar and Leonardo Vanneschi and Kent McClymont and Ed Keedwell and Emma Hart and Kevin Sim and Steven Gustafson and Ekaterina Vladislavleva and Anne Auger and Bernd Bischl and Dimo Brockhoff and Nikolaus Hansen and Olaf Mersmann and Petr Posik and Heike Trautmann and Muhammad Iqbal and Kamran Shafi and Ryan Urbanowicz and Stefan Wagner and Michael Affenzeller and David Walker and Richard Everson and Jonathan Fieldsend and Forrest Stonedahl and William Rand and Stephen L. Smith and Stefano Cagnoni and Robert M. Patton and Gisele L. Pappa and John Woodward and Jerry Swan and Krzysztof Krawiec and Alexandru-Adrian Tantar and Peter A. N. Bosman and Miguel Vega-Rodriguez and Jose M. Chaves-Gonzalez and David L. Gonzalez-Alvarez and Sergio Santander-Jimenez and Lee Spector and Maarten Keijzer and Kenneth Holladay and Tea Tusar and Boris Naujoks editors, GECCO '13 Companion: Proceeding of the fifteenth annual conference companion on Genetic and evolutionary computation conference companion, pages 159-160, Amsterdam, The Netherlands, 2013. ACM. details

  8. Patrick LaRoche and Aimee Burrows and A. Nur Zincir-Heywood. How far an Evolutionary Approach can go for Protocol State Analysis and Discovery. In Luis Gerardo de la Fraga editor, 2013 IEEE Conference on Evolutionary Computation, volume 1, pages 3228-3235, Cancun, Mexico, 2013. details

  9. Fariba Haddadi and H. Gunes Kayacik and A. Nur Zincir-Heywood and Malcolm I. Heywood. Malicious Automatically Generated Domain Name Detection Using Stateful-SBB. In Anna I. Esparcia-Alcazar and Antonio Della Cioppa and Ivanoe De Falco and Ernesto Tarantino and Carlos Cotta and Robert Schaefer and Konrad Diwold and Kyrre Glette and Andrea Tettamanzi and Alexandros Agapitos and Paolo Burrelli and J. J. Merelo and Stefano Cagnoni and Mengjie Zhang and Neil Urquhart and Kevin Sim and Aniko Ekart and Francisco Fernandez de Vega and Sara Silva and Evert Haasdijk and Gusz Eiben and Anabela Simoes and Philipp Rohlfshagen editors, Applications of Evolutionary Computing, EvoApplications 2013: EvoCOMNET, EvoCOMPLEX, EvoENERGY, EvoFIN, EvoGAMES, EvoIASP, EvoINDUSTRY, EvoNUM, EvoPAR, EvoRISK, EvoROBOT, EvoSTOC, volume 7835, pages 529-539, Vienna, 2013. Springer Verlag. details

  10. Fariba Haddadi and A. Nur Zincir-Heywood. Analyzing String Format-Based Classifiers For Botnet Detection: GP and SVM. In Luis Gerardo de la Fraga editor, 2013 IEEE Conference on Evolutionary Computation, volume 1, pages 2626-2633, Cancun, Mexico, 2013. details

  11. Patrick LaRoche and A. Nur Zincir-Heywood and Malcolm I. Heywood. Protocol Discovery and Analysis via Live Interaction. In Cecilia Di Chio and Alexandros Agapitos and Stefano Cagnoni and Carlos Cotta and F. Fernandez de Vega and Gianni A. Di Caro and Rolf Drechsler and Aniko Ekart and Anna I Esparcia-Alcazar and Muddassar Farooq and William B. Langdon and Juan J. Merelo and Mike Preuss and Hendrik Richter and Sara Silva and Anabela Simoes and Giovanni Squillero and Ernesto Tarantino and Andrea G. B. Tettamanzi and Julian Togelius and Neil Urquhart and A. Sima Uyar and Georgios N. Yannakakis editors, Applications of Evolutionary Computing, EvoApplications2012: EvoCOMNET, EvoCOMPLEX, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoNUM, EvoPAR, EvoRISK, EvoSTIM, EvoSTOC, volume 7248, pages 11-20, Malaga, Spain, 2012. Springer Verlag. details

  12. Aaron Atwater and Malcolm I. Heywood and Nur Zincir-Heywood. GP under streaming data constraints: a case for pareto archiving?. In Terry Soule and Anne Auger and Jason Moore and David Pelta and Christine Solnon and Mike Preuss and Alan Dorin and Yew-Soon Ong and Christian Blum and Dario Landa Silva and Frank Neumann and Tina Yu and Aniko Ekart and Will Browne and Tim Kovacs and Man-Leung Wong and Clara Pizzuti and Jon Rowe and Tobias Friedrich and Giovanni Squillero and Nicolas Bredeche and Stephen L. Smith and Alison Motsinger-Reif and Jose Lozano and Martin Pelikan and Silja Meyer-Nienberg and Christian Igel and Greg Hornby and Rene Doursat and Steve Gustafson and Gustavo Olague and Shin Yoo and John Clark and Gabriela Ochoa and Gisele Pappa and Fernando Lobo and Daniel Tauritz and Jurgen Branke and Kalyanmoy Deb editors, GECCO '12: Proceedings of the fourteenth international conference on Genetic and evolutionary computation conference, pages 703-710, Philadelphia, Pennsylvania, USA, 2012. ACM. details

  13. Patrick LaRoche and A. Nur Zincir-Heywood and Malcolm I. Heywood. Exploring the state space of an application protocol: A case study of SMTP. In IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2011), pages 152-159, Paris, 2011. details

  14. Riyad Alshammari and A. Nur Zincir-Heywood. Is Machine Learning losing the battle to produce transportable signatures against VoIP traffic?. In Alice E. Smith editor, Proceedings of the 2011 IEEE Congress on Evolutionary Computation, pages 1542-1549, New Orleans, USA, 2011. IEEE Press. details

  15. Patrick LaRoche and Nur Zincir-Heywood and Malcolm Heywood. Using Code Bloat to Obfuscate Evolved Network Traffic. In Cecilia Di Chio and Anthony Brabazon and Gianni A. Di Caro and Marc Ebner and Muddassar Farooq and Andreas Fink and Jorn Grahl and Gary Greenfield and Penousal Machado and Michael O'Neill and Ernesto Tarantino and Neil Urquhart editors, EvoCOMNET, volume 6025, pages 101-110, Istanbul, 2010. Springer. details

  16. Riyad Alshammari and A. Nur Zincir-Heywood. Unveiling Skype encrypted tunnels using GP. In IEEE Congress on Evolutionary Computation (CEC 2010), Barcelona, Spain, 2010. IEEE Press. details

  17. Riyad Alshammari and A. Nur Zincir-Heywood. An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype. In 2010 International Conference on Network and Service Management (CNSM), pages 310-313, 2010. details

  18. Patrick LaRoche and Nur Zincir-Heywood and Malcolm I. Heywood. Evolving TCP/IP packets: A case study of port scans. In IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, pages 1-8, 2009. details

  19. H. Gunes Kayacik and A. Nur Zincir-Heywood and Malcolm I. Heywood and Stefan Burschka. Generating mimicry attacks using genetic programming: A benchmarking study. In IEEE Symposium on Computational Intelligence in Cyber Security, CICS '09, pages 136-143, 2009. details

  20. Riyad Alshammari and Peter Lichodzijewski and Malcolm I. Heywood and A. Nur Zincir-Heywood. Classifying SSH encrypted traffic with minimum packet header features using genetic programming. In Anna I. Esparcia and Ying-ping Chen and Gabriela Ochoa and Ender Ozcan and Marc Schoenauer and Anne Auger and Hans-Georg Beyer and Nikolaus Hansen and Steffen Finck and Raymond Ros and Darrell Whitley and Garnett Wilson and Simon Harding and W. B. Langdon and Man Leung Wong and Laurence D. Merkle and Frank W. Moore and Sevan G. Ficici and William Rand and Rick Riolo and Nawwaf Kharma and William R. Buckley and Julian Miller and Kenneth Stanley and Jaume Bacardit and Will Browne and Jan Drugowitsch and Nicola Beume and Mike Preuss and Stephen L. Smith and Stefano Cagnoni and Jim DeLeo and Alexandru Floares and Aaron Baughman and Steven Gustafson and Maarten Keijzer and Arthur Kordon and Clare Bates Congdon and Laurence D. Merkle and Frank W. Moore editors, GECCO-2009 Defense applications of computational intelligence workshop, pages 2539-2546, Montreal, 2009. ACM. details

  21. Adetokunbo Makanju and A. Nur Zincir-Heywood and Evangelos E. Milios. Adaptabilty of a GP Based IDS on Wireless Networks. In Third International Conference on Availability, Reliability and Security, ARES 08, pages 310-318, 2008. details

  22. H. Gunes Kayacik and Malcolm Iain Heywood and A. Nur Zincir-Heywood. Evolving Buffer Overflow Attacks with Detector Feedback. In Mario Giacobini and Anthony Brabazon and Stefano Cagnoni and Gianni A. Di Caro and Rolf Drechsler and Muddassar Farooq and Andreas Fink and Evelyne Lutton and Penousal Machado and Stefan Minner and Michael O'Neill and Juan Romero and Franz Rothlauf and Giovanni Squillero and Hideyuki Takagi and A. Sima Uyar and Shengxiang Yang editors, Applications of Evolutionary Computing, EvoWorkshops2007: EvoCOMNET, EvoFIN, EvoIASP, EvoInteraction, EvoMUSART, EvoSTOC, EvoTransLog, volume 4448, pages 11-20, Valencia, Spain, 2007. Springer Verlag. details

  23. H. Gunes Kayacik and A. Nur Zincir-Heywood and Malcolm I. Heywood. Automatically Evading IDS using GP Authored Attacks. In IEEE Symposium on computational Intelligence in Security and Defense Applications, pages 153-160, Honolulu, 2007. IEEE Press. details

  24. Patrick LaRoche and A. Nur Zincir-Heywood. 802.11 De-authentication Attack Detection using Genetic Programming. In Pierre Collet and Marco Tomassini and Marc Ebner and Steven Gustafson and Anik\'o Ek\'art editors, Proceedings of the 9th European Conference on Genetic Programming, volume 3905, pages 1-12, Budapest, Hungary, 2006. Springer. details

  25. Xiao Luo and A. Nur Zincir-Heywood. Evolving Recurrent Linear-GP for Document Classification and Word Tracking. In Gary G. Yen and Lipo Wang and Piero Bonissone and Simon M. Lucas editors, Proceedings of the 2006 IEEE Congress on Evolutionary Computation, pages 8605-8612, Vancouver, 2006. IEEE Press. details

  26. Hilmi Gunes Kayacik and Malcolm Heywood and Nur Zincir-Heywood. On evolving buffer overflow attacks using genetic programming. In Maarten Keijzer and Mike Cattolico and Dirk Arnold and Vladan Babovic and Christian Blum and Peter Bosman and Martin V. Butz and Carlos Coello Coello and Dipankar Dasgupta and Sevan G. Ficici and James Foster and Arturo Hernandez-Aguirre and Greg Hornby and Hod Lipson and Phil McMinn and Jason Moore and Guenther Raidl and Franz Rothlauf and Conor Ryan and Dirk Thierens editors, GECCO 2006: Proceedings of the 8th annual conference on Genetic and evolutionary computation, volume 2, pages 1667-1674, Seattle, Washington, USA, 2006. ACM Press. details

  27. Patrick LaRoche and A. Nur Zincir-Heywood. Genetic Programming Based WiFi Data Link Layer Attack Detection. In 4th Annual Communication Networks and Services Research Conference (CNSR'06), pages 285-292, 2006. IEEE Computer Society. details

  28. Peter Lichodzijewski and Malcolm I. Heywood and A. Nur Zincir-Heywood. CasGP: Building Cascaded Hierarchical Models Using Niching. In David Corne and Zbigniew Michalewicz and Marco Dorigo and Gusz Eiben and David Fogel and Carlos Fonseca and Garrison Greenwood and Tan Kay Chen and Guenther Raidl and Ali Zalzala and Simon Lucas and Ben Paechter and Jennifier Willies and Juan J. Merelo Guervos and Eugene Eberbach and Bob McKay and Alastair Channon and Ashutosh Tiwari and L. Gwenn Volkert and Dan Ashlock and Marc Schoenauer editors, Proceedings of the 2005 IEEE Congress on Evolutionary Computation, volume 2, pages 1180-1187, Edinburgh, UK, 2005. IEEE Press. details

  29. Patrick LaRoche and A. Nur Zincir-Heywood. 802.11 Network Intrusion Detection using Genetic Programming. In Franz Rothlauf and Misty Blowers and J\"urgen Branke and Stefano Cagnoni and Ivan I. Garibay and Ozlem Garibay and J\"orn Grahl and Gregory Hornby and Edwin D. de Jong and Tim Kovacs and Sanjeev Kumar and Claudio F. Lima and Xavier Llor\`a and Fernando Lobo and Laurence D. Merkle and Julian Miller and Jason H. Moore and Michael O'Neill and Martin Pelikan and Terry P. Riopka and Marylyn D. Ritchie and Kumara Sastry and Stephen L. Smith and Hal Stringer and Keiki Takadama and Marc Toussaint and Stephen C. Upton and Alden H. Wright editors, Genetic and Evolutionary Computation Conference (GECCO2005) workshop program, pages 170-171, Washington, D.C., USA, 2005. ACM Press. details

  30. Xiao Luo and Malcolm I. Heywood and A. Nur Zincir-Heywood. Evolving recurrent models using linear GP. In Hans-Georg Beyer and Una-May O'Reilly and Dirk V. Arnold and Wolfgang Banzhaf and Christian Blum and Eric W. Bonabeau and Erick Cantu-Paz and Dipankar Dasgupta and Kalyanmoy Deb and James A. Foster and Edwin D. de Jong and Hod Lipson and Xavier Llora and Spiros Mancoridis and Martin Pelikan and Guenther R. Raidl and Terence Soule and Andy M. Tyrrell and Jean-Paul Watson and Eckart Zitzler editors, GECCO 2005: Proceedings of the 2005 conference on Genetic and evolutionary computation, volume 2, pages 1787-1788, Washington DC, USA, 2005. ACM Press. details

  31. H. Gunes Kayacyk and A. Nur Zincir-Heywood and Malcolm Heywood. Evolving Successful Stack Overflow Attacks for Vulnerability Testing. In 21st Annual Computer Security Applications Conference (ACSAC'05), pages 225-234, 2005. IEEE Computer Society. details

  32. D. Song and R. Curry and M. I. Heywood and A. N. Zincir-Heywood. On the Efficient Mining of Network Audit Data using Genetic Programming. In R. Poli and S. Cagnoni and M. Keijzer and E. Costa and F. Pereira and G. Raidl and S. C. Upton and D. Goldberg and H. Lipson and E. de Jong and J. Koza and H. Suzuki and H. Sawai and I. Parmee and M. Pelikan and K. Sastry and D. Thierens and W. Stolzmann and P. L. Lanzi and S. W. Wilson and M. O'Neill and C. Ryan and T. Yu and J. F. Miller and I. Garibay and G. Holifield and A. S. Wu and T. Riopka and M. M. Meysenburg and A. W. Wright and N. Richter and J. H. Moore and M. D. Ritchie and L. Davis and R. Roy and M. Jakiela editors, GECCO 2004 Workshop Proceedings, Seattle, Washington, USA, 2004. details

  33. Peter Lichodzijewski and Nur Zincir-Heywood and Malcolm Heywood. Cascaded GP Models for Data Mining. In Proceedings of the 2004 IEEE Congress on Evolutionary Computation, pages 2258-2264, Portland, Oregon, 2004. IEEE Press. details

  34. Dong Song and Malcolm I. Heywood and A. Nur Zincir-Heywood. A Linear Genetic Programming Approach to Intrusion Detection. In E. Cant\'u-Paz and J. A. Foster and K. Deb and D. Davis and R. Roy and U.-M. O'Reilly and H.-G. Beyer and R. Standish and G. Kendall and S. Wilson and M. Harman and J. Wegener and D. Dasgupta and M. A. Potter and A. C. Schultz and K. Dowsland and N. Jonoska and J. Miller editors, Genetic and Evolutionary Computation -- GECCO-2003, volume 2724, pages 2325-2336, Chicago, 2003. Springer-Verlag. details

  35. M. I. Heywood and A. N. Zincir-Heywood. Register Based Genetic Programming on FPGA Computing Platforms. In Riccardo Poli and Wolfgang Banzhaf and William B. Langdon and Julian F. Miller and Peter Nordin and Terence C. Fogarty editors, Genetic Programming, Proceedings of EuroGP'2000, volume 1802, pages 44-59, Edinburgh, 2000. Springer-Verlag. details

  36. M. I. Heywood and A. N. Zincir-Heywood. Page-based linear genetic programming. In Systems, Man, and Cybernetics, 2000 IEEE International Conference, volume 5, pages 3823-3828, Nashville, TN, USA, 2000. IEEE Press. details

Genetic Programming book chapters by Nur Zincir-Heywood

Genetic Programming other entries for Nur Zincir-Heywood