Genetic Algorithms for the Travelling Salesman Problem: A Review of Representations and Operators
Artificial Intelligence Review
Fault Injection and a Timing Channel on an Analysis Technique
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Evolutionary computation in computer security and cryptography
New Generation Computing - Evolutionary computation
Attacks of simple block ciphers via efficient heuristics
Information Sciences: an International Journal
Security in outsourcing of association rule mining
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Experiments on cryptanalysing block ciphers via evolutionary computation paradigms
EC'06 Proceedings of the 7th WSEAS International Conference on Evolutionary Computing
Proceedings of the 10th annual conference on Genetic and evolutionary computation
Quantitative Cryptanalysis of Six-Round DES Using Evolutionary Algorithms
ISICA '08 Proceedings of the 3rd International Symposium on Advances in Computation and Intelligence
Cryptanalysis of four-rounded DES using binary particle swarm optimization
Proceedings of the 11th Annual conference on Genetic and evolutionary computation
Cryptanalysis of four-rounded DES using binary particleswarm optimization
Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference: Late Breaking Papers
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartII
Cryptanalysis of two-round DES using genetic algorithms
ISICA'07 Proceedings of the 2nd international conference on Advances in computation and intelligence
k-Support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Cryptanalysis of simplified-DES using computational intelligence
WSEAS Transactions on Computers
Cryptanalysis of substitution ciphers using scatter search
IWINAC'05 Proceedings of the First international work-conference on the Interplay Between Natural and Artificial Computation conference on Artificial Intelligence and Knowledge Engineering Applications: a bioinspired approach - Volume Part II
Cryptanalysis of four-rounded DES using binary artificial immune system
ICSI'10 Proceedings of the First international conference on Advances in Swarm Intelligence - Volume Part I
Proceedings of the 5th ACM workshop on Security and artificial intelligence
Hi-index | 0.00 |