Using code bloat to obfuscate evolved network traffic

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
Original languageEnglish
Title of host publicationApplications of Evolutionary Computation - EvoApplications 2010
Subtitle of host publicationEvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoMUSART, and EvoTRANSLOG, Proceedings
PublisherSpringer Verlag
Pages101-110
Number of pages10
EditionPART 2
ISBN (Print)3642122418, 9783642122415
DOIs
Publication statusPublished - 2010
EventEvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoMUSART, and EvoTRANSLOG, EvoApplications 2010 - Istanbul, Turkey
Duration: Apr 7 2010Apr 9 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 2
Volume6025 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceEvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoMUSART, and EvoTRANSLOG, EvoApplications 2010
Country/TerritoryTurkey
CityIstanbul
Period4/7/104/9/10

ASJC Scopus Subject Areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Using code bloat to obfuscate evolved network traffic'. Together they form a unique fingerprint.

Cite this