{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:51:27Z","timestamp":1725551487102},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122415"},{"type":"electronic","value":"9783642122422"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12242-2_11","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T17:12:14Z","timestamp":1270055534000},"page":"101-110","source":"Crossref","is-referenced-by-count":4,"title":["Using Code Bloat to Obfuscate Evolved Network Traffic"],"prefix":"10.1007","author":[{"given":"Patrick","family":"LaRoche","sequence":"first","affiliation":[]},{"given":"Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]},{"given":"Malcolm I.","family":"Heywood","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"11_CR1","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1109\/TSMCB.2002.999814","volume":"32","author":"M.I. Heywood","year":"2002","unstructured":"Heywood, M.I., Zincir-Heywood, A.N.: Dynamic page based crossover in linear genetic programming. IEEE Transactions on Systems, Man, and Cybernetics: Part B - Cybernetics\u00a032(3), 380\u2013388 (2002)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Part B - Cybernetics"},{"key":"11_CR2","first-page":"311","volume-title":"Advances in Genetic Programming","author":"P. Nordin","year":"1994","unstructured":"Nordin, P.: A compiling genetic programming system that directly manipulates the machine code. In: Kinnear Jr., K.E. (ed.) Advances in Genetic Programming, pp. 311\u2013331. MIT Press, Cambridge (1994)"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/978-3-540-71805-5_2","volume-title":"Applications of Evolutionary Computing","author":"H.G. Kayacik","year":"2007","unstructured":"Kayacik, H.G., Heywood, M.I., Zincir-Heywood, A.N.: Evolving buffer overflow attacks with detector feedback. In: Giacobini, M. (ed.) EvoWorkshops 2007. LNCS, vol.\u00a04448, pp. 11\u201320. Springer, Heidelberg (2007)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"LaRoche, P., Zincir-Heywood, N., Heywood, M.: Evolving tcp\/ip packets: A case study of port scans. In: Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (2009)","DOI":"10.1109\/CISDA.2009.5356541"},{"key":"11_CR5","unstructured":"Snort. org: Snort ids (March 2009)"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-540-87403-4_19","volume-title":"Recent Advances in Intrusion Detection","author":"A.B. Ashfaq","year":"2008","unstructured":"Ashfaq, A.B., Robert, M.J., Mumtaz, A., Ali, M.Q., Sajjad, A., Khayam, S.A.: A comparative evaluation of anomaly detectors under portscan attacks. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol.\u00a05230, pp. 351\u2013371. Springer, Heidelberg (2008)"},{"key":"11_CR7","unstructured":"Symantec: Global Internet Security Threat Report trends for July-December 2007, vol.\u00a0XIII, Symantec (2008)"},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1109\/DSN.2005.18","volume-title":"DSN 2005: Proceedings of the 2005 International Conference on Dependable Systems and Networks","author":"S. Panjwani","year":"2005","unstructured":"Panjwani, S., Tan, S., Jarrin, K.M.: An experimental evaluation to determine if port scans are precursors to an attack. In: DSN 2005: Proceedings of the 2005 International Conference on Dependable Systems and Networks, pp. 602\u2013611. IEEE Computer Society, Washington (2005)"},{"key":"11_CR9","unstructured":"Soule, T., Professor, M., Foster, J.A., Foster, J.A., Alves-foss, J., Frenzel, J.F., Frincke, D., Jacobsen, R.T., Shreeve, J.M.: Code growth in genetic programming (1998)"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/BF00175355","volume":"4","author":"J.R. Koza","year":"1994","unstructured":"Koza, J.R.: Genetic programming as a means for programming computers by natural selection. Stat. Comput.\u00a04, 191\u2013198 (1994)","journal-title":"Stat. Comput."},{"key":"11_CR11","unstructured":"Nordin, P., Francone, F., Banzhaf, W.: Explicitly defined introns and destructive crossover in genetic programming (1995)"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"1667","DOI":"10.1145\/1143997.1144271","volume-title":"GECCO 2006: Proceedings of the 8th annual conference on Genetic and evolutionary computation","author":"H.G. Kayacik","year":"2006","unstructured":"Kayacik, H.G., Heywood, M., Zincir-Heywood, N.: On evolving buffer overflow attacks using genetic programming. In: GECCO 2006: Proceedings of the 8th annual conference on Genetic and evolutionary computation, pp. 1667\u20131674. ACM, New York (2006)"},{"key":"11_CR13","first-page":"315","volume-title":"Genetic Programming 1996: Proceedings of the First Annual Conference","author":"L. Huelsbergen","year":"1996","unstructured":"Huelsbergen, L.: Toward simulated evolution of machine language iteration. In: Koza, J.R., Goldberg, D.E., Fogel, D.B., Riolo, R.L. (eds.) Genetic Programming 1996: Proceedings of the First Annual Conference, Stanford University, CA, USA, pp. 315\u2013320. MIT Press, Cambridge (1996)"}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutionary Computation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12242-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T17:56:04Z","timestamp":1558288564000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12242-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122415","9783642122422"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12242-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}