{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:47:16Z","timestamp":1775069236165,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,7,8]],"date-time":"2006-07-08T00:00:00Z","timestamp":1152316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,7,8]]},"DOI":"10.1145\/1143997.1144271","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"1667-1674","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["On evolving buffer overflow attacks using genetic programming"],"prefix":"10.1145","author":[{"given":"Hilmi G\u00fcne\u015f","family":"Kayacik","sequence":"first","affiliation":[{"name":"Dalhousie University, Halifax, Nova Scotia, Canada"}]},{"given":"Malcolm","family":"Heywood","sequence":"additional","affiliation":[{"name":"Dalhousie University, Halifax, Nova Scotia, Canada"}]},{"given":"Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[{"name":"Dalhousie University, Halifax, Nova Scotia, Canada"}]}],"member":"320","published-online":{"date-parts":[[2006,7,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756582.1756714"},{"key":"e_1_3_2_1_2_1","first-page":"161","volume-title":"Towards Efficient Training on Large Datasets for Genetic Programming. In Canadian Conference on Artificial Intelligence","author":"Curry R.","year":"2004","unstructured":"R. Curry , M.I. Heywood . Towards Efficient Training on Large Datasets for Genetic Programming. In Canadian Conference on Artificial Intelligence , pages 161 - 174 , Springer-Verlag, Lecture Notes in Artificial Intelligence , 3060, May 2004 . R. Curry, M.I. Heywood. Towards Efficient Training on Large Datasets for Genetic Programming. In Canadian Conference on Artificial Intelligence, pages 161-174, Springer-Verlag, Lecture Notes in Artificial Intelligence, 3060, May 2004."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2004.841683"},{"key":"e_1_3_2_1_4_1","unstructured":"ADMmutate. http:\/\/www.ktwu.ca\/security.html  ADMmutate. http:\/\/www.ktwu.ca\/security.html"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586145"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754701.1754707"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030088"},{"key":"e_1_3_2_1_8_1","volume-title":"M-Z","author":"Developer's Manual Architecture Software","year":"2005","unstructured":"IA-32 Intel, Architecture Software Developer's Manual Volumes 2A, 2B : Instruction Set Reference, A-M , M-Z , 2005 IA-32 Intel, Architecture Software Developer's Manual Volumes 2A, 2B: Instruction Set Reference, A-M, M-Z, 2005"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2002.999814"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.23"},{"key":"e_1_3_2_1_11_1","first-page":"263","volume-title":"Proceedings of the Genetic and Evolutionary Computation Conference","author":"Dozier G.","year":"2004","unstructured":"G. Dozier , D. Brown , K. Cain , J. Hurley, Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers , In Proceedings of the Genetic and Evolutionary Computation Conference , pages 263 - 274 . Lecture Notes in Computer Science, LNCS 3102 , 2004 . G. Dozier, D. Brown, K. Cain, J. Hurley, Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers, In Proceedings of the Genetic and Evolutionary Computation Conference, pages 263-274. Lecture Notes in Computer Science, LNCS 3102, 2004."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1068009.1068331"}],"event":{"name":"GECCO06: Genetic and Evolutionary Computation Conference","location":"Seattle Washington USA","acronym":"GECCO06","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 8th annual conference on Genetic and evolutionary computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1143997.1144271","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1143997.1144271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:29Z","timestamp":1750262909000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1143997.1144271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,7,8]]},"references-count":12,"alternative-id":["10.1145\/1143997.1144271","10.1145\/1143997"],"URL":"https:\/\/doi.org\/10.1145\/1143997.1144271","relation":{},"subject":[],"published":{"date-parts":[[2006,7,8]]},"assertion":[{"value":"2006-07-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}