Review into state of the art of vulnerability assessment using artificial intelligence
S Khan, S Parkinson - Guide to Vulnerability Analysis for Computer …, 2018 - Springer
Vulnerability assessment is the essential and well-established process of probing security
flaws, weaknesses and inadequacies in a computing infrastructure. The process helps …
flaws, weaknesses and inadequacies in a computing infrastructure. The process helps …
Multi-heuristic a
The performance of heuristic search-based planners depends heavily on the quality of the
heuristic function used to focus the search. These algorithms work fast and generate high …
heuristic function used to focus the search. These algorithms work fast and generate high …
Racod: algorithm/hardware co-design for mobile robot path planning
RACOD is an algorithm/hardware co-design for mobile robot path planning. It consists of two
main components: CODAcc, a hardware accelerator for collision detection; and RASExp, an …
main components: CODAcc, a hardware accelerator for collision detection; and RASExp, an …
[PDF][PDF] Exploring Game Space Using Survival Analysis.
Game designers adjust game parameters to create an optimal experience for players. We
call this high-dimensional set of unique game variants game space. To help designers …
call this high-dimensional set of unique game variants game space. To help designers …
Learning inadmissible heuristics during search
Suboptimal search algorithms offer shorter solving times by sacrificing guaranteed solution
optimality. While optimal searchalgorithms like A* and IDA* require admissible heuristics …
optimality. While optimal searchalgorithms like A* and IDA* require admissible heuristics …
Efficient distribution of virtual machines for cloud computing
M Schmidt, N Fallenbeck, M Smith… - 2010 18th Euromicro …, 2010 - ieeexplore.ieee.org
The commercial success of Cloud computing and recent developments in Grid computing
have brought platform virtualization technology into the field of high performance computing …
have brought platform virtualization technology into the field of high performance computing …
Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach
S Khan, S Parkinson - Expert Systems with Applications, 2018 - Elsevier
Vulnerability assessment and security configuration activities are heavily reliant on expert
knowledge. This requirement often results in many systems being left insecure due to a lack …
knowledge. This requirement often results in many systems being left insecure due to a lack …
Learning to plan for constrained manipulation from demonstrations
Motion planning in high dimensional state spaces, such as for mobile manipulation, is a
challenging problem. Constrained manipulation, eg, opening articulated objects like doors …
challenging problem. Constrained manipulation, eg, opening articulated objects like doors …
Distributed island-model genetic algorithms using heterogeneous parameter settings
Y Gong, A Fukunaga - 2011 IEEE congress of evolutionary …, 2011 - ieeexplore.ieee.org
Achieving good performance with a parallel genetic algorithm requires properly configuring
control parameters such as mutation rate, crossover rate, and population size. We consider …
control parameters such as mutation rate, crossover rate, and population size. We consider …
Collaborative privacy preserving multi-agent planning: Planners and heuristics
In many cases several entities, such as commercial companies, need to work together
towards the achievement of joint goals, while hiding certain private information. To …
towards the achievement of joint goals, while hiding certain private information. To …