{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:59:27Z","timestamp":1725530367095},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642011283"},{"type":"electronic","value":"9783642011290"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01129-0_13","type":"book-chapter","created":{"date-parts":[[2009,4,10]],"date-time":"2009-04-10T05:05:44Z","timestamp":1239339944000},"page":"105-110","source":"Crossref","is-referenced-by-count":0,"title":["Testing Detector Parameterization Using Evolutionary Exploit Generation"],"prefix":"10.1007","author":[{"given":"Hilmi G.","family":"Kayac\u0131k","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]},{"given":"Malcolm I.","family":"Heywood","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Burschka","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","first-page":"1667","volume-title":"Proceedings of the Conference on Genetic and Evolutionary Computation (GECCO)","author":"H.G. Kayacik","year":"2006","unstructured":"Kayacik, H.G., Heywood, M., Zincir-Heywood, N.: On evolving buffer overflow attacks using genetic programming. In: Proceedings of the Conference on Genetic and Evolutionary Computation (GECCO), SIGEVO, pp. 1667\u20131674. ACM, New York (2006)"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A.B., Longstaff, T.A.: A sense of self for unix processes. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 120\u2013128 (1996)","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/978-3-540-71805-5_2","volume-title":"Applications of Evolutionary Computing","author":"H.G. Kayacik","year":"2007","unstructured":"Kayacik, H.G., Heywood, M., Zincir-Heywood, N.: Evolving buffer overflow attacks with detector feedback. In: Giacobini, M. (ed.) EvoWorkshops 2007. LNCS, vol.\u00a04448, pp. 11\u201320. Springer, Heidelberg (2007)"},{"key":"13_CR4","unstructured":"Somayaji, A.B.: Operating system stability and security through process homeostasis. PhD thesis, The University of New Mexico (2002)"},{"key":"13_CR5","volume-title":"Genetic Algorithms in Search Optimization and Machine Learning","author":"D.E. Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search Optimization and Machine Learning. Addison-Wesley, Reading (1989)"},{"key":"13_CR6","volume-title":"Multi-Objective Optimization using Evolutionary Algorithms","author":"K. Deb","year":"2001","unstructured":"Deb, K.: Multi-Objective Optimization using Evolutionary Algorithms. John Wiley and Sons, Chichester (2001)"},{"issue":"3","key":"13_CR7","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1162\/106365602760234117","volume":"10","author":"R. Kumar","year":"2002","unstructured":"Kumar, R., Rockett, P.: Improved sampling of the pareto-front in multiobjective genetic optimizations by steady-state evolution. Evolutionary Computation\u00a010(3), 283\u2013314 (2002)","journal-title":"Evolutionary Computation"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36084-0_4","volume-title":"Recent Advances in Intrusion Detection","author":"K. Tan","year":"2002","unstructured":"Tan, K., Killourhy, K., Maxion, R.: Undermining an anomaly-based Intrusion Detection System using common exploits. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, pp. 54\u201373. Springer, Heidelberg (2002)"},{"key":"13_CR9","unstructured":"SecurityFocus: Lbnl traceroute heap corruption vulnerability (last accessed June 2008), \n                    \n                      http:\/\/www.securityfocus.com\/bid\/1739"}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutionary Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01129-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T05:38:18Z","timestamp":1551937098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01129-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642011283","9783642011290"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01129-0_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}