ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2004.04647
  4. Cited By
Adversarial Genetic Programming for Cyber Security: A Rising Application
  Domain Where GP Matters

Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters

Genetic Programming and Evolvable Machines (GPEM), 2020
7 April 2020
Una-May O’Reilly
J. Toutouh
M. Pertierra
Daniel Prado Sanchez
Dennis Garcia
Anthony Erb Luogo
Jonathan Kelly
Erik Hemberg
    SILMAAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters"

5 / 5 papers shown
Guiding Evolutionary AutoEncoder Training with Activation-Based Pruning Operators
Guiding Evolutionary AutoEncoder Training with Activation-Based Pruning OperatorsAnnual Conference on Genetic and Evolutionary Computation (GECCO), 2025
Steven Jorgensen
Erik Hemberg
J. Toutouh
Una-May O’Reilly
242
0
0
08 May 2025
Evolving Assembly Code in an Adversarial Environment
Evolving Assembly Code in an Adversarial Environment
Irina Maliukov
Gera Weiss
Oded Margalit
Achiya Elyasaf
139
2
0
28 Mar 2024
LLMs Killed the Script Kiddie: How Agents Supported by Large Language
  Models Change the Landscape of Network Threat Testing
LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing
Stephen Moskal
Sam Laney
Erik Hemberg
Una-May O’Reilly
263
36
0
10 Oct 2023
Runtime Analysis of Competitive co-Evolutionary Algorithms for Maximin Optimisation of a Bilinear Function
Runtime Analysis of Competitive co-Evolutionary Algorithms for Maximin Optimisation of a Bilinear FunctionAnnual Conference on Genetic and Evolutionary Computation (GECCO), 2022
Per Kristian Lehre
325
18
0
30 Jun 2022
Using a Collated Cybersecurity Dataset for Machine Learning and
  Artificial Intelligence
Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence
Erik Hemberg
Una-May O’Reilly
165
11
0
05 Aug 2021
1
Page 1 of 1