John Hurley
  According to our database1,
  John Hurley
  authored at least 10 papers
  between 2002 and 2012.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2012
    Proceedings of IEEE International Conference on Communications, 2012
    
  
  2011
  2010
    Proceedings of the Genetic and Evolutionary Computation Conference, 2010
    
  
  2009
    Proceedings of the Internet of the Future, 2009
    
  
    Proceedings of the 6th International ICST Conference on Broadband Communications, 2009
    
  
  2007
Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers.
    
  
    Appl. Soft Comput., 2007
    
  
  2004
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers.
    
  
    Proceedings of the Genetic and Evolutionary Computation, 2004
    
  
Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm red teams.
    
  
    Proceedings of the IEEE Congress on Evolutionary Computation, 2004
    
  
  2002
Security on Macintosh OS X.
  
    Proceedings of the 16th Conference on Systems Administration (LISA 2002), 2002