Coevolutionary search among adversaries
Coevolutionary search among adversaries
Evolutionary Design by Computers with CDrom
Evolutionary Design by Computers with CDrom
An Introduction to Genetic Algorithms
An Introduction to Genetic Algorithms
Genetic Algorithms in Search, Optimization and Machine Learning
Genetic Algorithms in Search, Optimization and Machine Learning
An Overview of Evolutionary Computation
ECML '93 Proceedings of the European Conference on Machine Learning
Evolutionary computation in civil engineering: research frontiers
Civil and structural engineering computing: 2001
Proceedings of the 13th annual conference companion on Genetic and evolutionary computation
Hi-index | 0.00 |
Identification of vulnerabilities of water distribution systems and identification of appropriate counter-measures are important components of homeland security. These are difficult and time consuming tasks. This paper provides a new approach to resolve these problems in complex infrastructure systems. It is based on the use of co-evolutionary computation for the generation of both terrorist and security scenarios. The basic concepts of co-evolutionary computation are briefly explained. The concept of co-evolutionary generation of terrorist and security scenarios is introduced in the context of a hypothetical water distribution system for a small town. A tool developed at George Mason University is used for a number of experiments that reveal a variety of emerging security patterns. The experiments show that these patterns may be helpful in effectively protecting the network.