dc.contributor.author | Shlapentokh-Rothman, Michal | |
dc.contributor.author | Hemberg, Erik | |
dc.contributor.author | O'Reilly, Una-May | |
dc.date.accessioned | 2022-11-07T18:34:45Z | |
dc.date.available | 2022-11-07T18:34:45Z | |
dc.date.issued | 2020-07-08 | |
dc.identifier.isbn | 978-1-4503-7127-8 | |
dc.identifier.uri | https://hdl.handle.net/1721.1/146195 | |
dc.publisher | ACM|Genetic and Evolutionary Computation Conference Companion | en_US |
dc.relation.isversionof | https://doi.org/10.1145/3377929.3398085 | en_US |
dc.rights | Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. | en_US |
dc.source | ACM|Genetic and Evolutionary Computation Conference Companion | en_US |
dc.title | Securing the Software Defined Perimeter with Evolutionary Co-Optimization | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Shlapentokh-Rothman, Michal, Hemberg, Erik and O'Reilly, Una-May. 2020. "Securing the Software Defined Perimeter with Evolutionary Co-Optimization." | |
dc.contributor.department | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory | |
dc.identifier.mitlicense | PUBLISHER_POLICY | |
dc.eprint.version | Final published version | en_US |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
dc.date.updated | 2022-11-02T20:35:31Z | |
dc.language.rfc3066 | en | |
dc.rights.holder | ACM | |
dspace.date.submission | 2022-11-02T20:35:31Z | |
mit.license | PUBLISHER_POLICY | |
mit.metadata.status | Authority Work and Publication Information Needed | en_US |