Published in

2016 IEEE Congress on Evolutionary Computation (CEC)

DOI: 10.1109/cec.2016.7743900

Links

Tools

Export citation

Search in Google Scholar

The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence

This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO