John Hurley
According to our database1,
John Hurley
authored at least 10 papers
between 2002 and 2012.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2012
Proceedings of IEEE International Conference on Communications, 2012
2011
2010
Proceedings of the Genetic and Evolutionary Computation Conference, 2010
2009
Proceedings of the Internet of the Future, 2009
Proceedings of the 6th International ICST Conference on Broadband Communications, 2009
2007
Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers.
Appl. Soft Comput., 2007
2004
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers.
Proceedings of the Genetic and Evolutionary Computation, 2004
Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm red teams.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004
2002
Security on Macintosh OS X.
Proceedings of the 16th Conference on Systems Administration (LISA 2002), 2002