Follow
Malcolm Heywood
Malcolm Heywood
Professor, Computer Science, Dalhousie University
Verified email at cs.dal.ca
Title
Cited by
Cited by
Year
Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings of the third annual conference on privacy, security and trust 94 …, 2005
5582005
Host-based intrusion detection using self-organizing maps
P Lichodzijewski, AN Zincir-Heywood, MI Heywood
Proceedings of the 2002 International Joint Conference on Neural Networks …, 2002
2572002
On the capability of an SOM based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings of the International Joint Conference on Neural Networks, 2003 …, 2003
2292003
A hierarchical SOM-based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Engineering applications of artificial intelligence 20 (4), 439-451, 2007
2272007
Training genetic programming on half a million patterns: an example from anomaly detection
D Song, MI Heywood, AN Zincir-Heywood
IEEE transactions on evolutionary computation 9 (3), 225-239, 2005
2022005
Analyzing data granularity levels for insider threat detection using machine learning
DC Le, N Zincir-Heywood, MI Heywood
IEEE Transactions on Network and Service Management 17 (1), 30-44, 2020
1422020
Comparing and combining dimension reduction techniques for efficient text clustering
B Tang, M Shepherd, E Milios, MI Heywood
Proceeding of SIAM international workshop on feature selection for data …, 2005
1202005
UV microstereolithography system that uses spatial light modulator technology
C Chatwin, M Farsari, S Huang, M Heywood, P Birch, R Young, ...
Applied optics 37 (32), 7514-7522, 1998
941998
A linear genetic programming approach to intrusion detection
D Song, MI Heywood, AN Zincir-Heywood
Genetic and Evolutionary Computation—GECCO 2003: Genetic and Evolutionary …, 2003
832003
GP classification under imbalanced data sets: Active sub-sampling and AUC approximation
J Doucette, MI Heywood
European Conference on Genetic Programming, 266-277, 2008
802008
Input partitioning to mixture of experts
B Tang, MI Heywood, M Shepherd
Proceedings of the 2002 International Joint Conference on Neural Networks …, 2002
802002
Managing team-based problem solving with symbiotic bid-based genetic programming
P Lichodzijewski, MI Heywood
Proceedings of the 10th annual conference on Genetic and evolutionary …, 2008
762008
Emergent tangled graph representations for Atari game playing agents
S Kelly, MI Heywood
Genetic Programming: 20th European Conference, EuroGP 2017, Amsterdam, The …, 2017
582017
Dynamic page based crossover in linear genetic programming
MI Heywood, AN Zincir-Heywood
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 32 …, 2002
582002
Symbiosis, complexification and simplicity under GP
P Lichodzijewski, MI Heywood
Proceedings of the 12th annual conference on Genetic and evolutionary …, 2010
572010
Comparing dimension reduction techniques for document clustering
B Tang, M Shepherd, MI Heywood, X Luo
Advances in Artificial Intelligence: 18th Conference of the Canadian Society …, 2005
552005
On botnet detection with genetic programming under streaming data, label budgets and class imbalance
S Khanchi, A Vahdat, MI Heywood, AN Zincir-Heywood
Proceedings of the Genetic and Evolutionary Computation Conference Companion …, 2018
542018
Scaling genetic programming to large datasets using hierarchical dynamic subset selection
R Curry, P Lichodzijewski, MI Heywood
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 37 …, 2007
542007
Data analytics on network traffic flows for botnet behaviour detection
DC Le, AN Zincir-Heywood, MI Heywood
2016 IEEE symposium series on computational intelligence (SSCI), 1-7, 2016
532016
Multi-task learning in atari video games with emergent tangled program graphs
S Kelly, MI Heywood
Proceedings of the Genetic and Evolutionary Computation Conference, 195-202, 2017
512017
The system can't perform the operation now. Try again later.
Articles 1–20