Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing

Hilmi Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood. Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing. Evolutionary Intelligence, 4(4):243-266, 2011. [doi]

@article{KayacikZH11-0,
  title = {Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing},
  author = {Hilmi Günes Kayacik and A. Nur Zincir-Heywood and Malcolm I. Heywood},
  year = {2011},
  doi = {10.1007/s12065-011-0065-0},
  url = {http://dx.doi.org/10.1007/s12065-011-0065-0},
  researchr = {https://researchr.org/publication/KayacikZH11-0},
  cites = {0},
  citedby = {0},
  journal = {Evolutionary Intelligence},
  volume = {4},
  number = {4},
  pages = {243-266},
}