Show simple item record

dc.contributor.authorMoskal, Stephen
dc.contributor.authorHemberg, Erik
dc.contributor.authorO'Reilly, Una-May
dc.date.accessioned2022-11-14T18:21:21Z
dc.date.available2022-11-14T18:21:21Z
dc.date.issued2022-07-09
dc.identifier.isbn978-1-4503-9268-6
dc.identifier.urihttps://hdl.handle.net/1721.1/146392
dc.publisherACM|Genetic and Evolutionary Computation Conference Companionen_US
dc.relation.isversionofhttps://doi.org/10.1145/3520304.3533999en_US
dc.rightsCreative Commons Attribution 4.0 International licenseen_US
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/en_US
dc.sourceACM|Genetic and Evolutionary Computation Conference Companionen_US
dc.titleCyberEvo: Evolutionary Search of Knowledge-based Behaviors in a Cyber Attack Campaignen_US
dc.typeArticleen_US
dc.identifier.citationMoskal, Stephen, Hemberg, Erik and O'Reilly, Una-May. 2022. "CyberEvo: Evolutionary Search of Knowledge-based Behaviors in a Cyber Attack Campaign."
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
dc.identifier.mitlicensePUBLISHER_CC
dc.eprint.versionFinal published versionen_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2022-11-03T07:49:26Z
dc.language.rfc3066en
dc.rights.holderThe author(s)
dspace.date.submission2022-11-03T07:49:27Z
mit.licensePUBLISHER_CC
mit.metadata.statusAuthority Work and Publication Information Neededen_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record