共 8 条
- [1] [Anonymous], 1995, Technical Report
- [3] Golberg D. E., 1989, GENETIC ALGORITHMS S, V1989, P36
- [4] Holland J.H., 1992, Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control and Artificial Intelligence
- [6] Automated vulnerability analysis: Leveraging control flow for evolutionary input crafting [J]. TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 477 - 486
- [7] Tracey N, 2000, SOFTWARE PRACT EXPER, V30, P61, DOI 10.1002/(SICI)1097-024X(200001)30:1<61::AID-SPE292>3.0.CO
- [8] 2-9