An improved bio-inspired based intrusion detection model for a cyberspace
Bio-inspired intrusion detection solutions provide better detection accuracy than
conventional solutions in securing cyberspace. However, existing bio-inspired anomaly …
conventional solutions in securing cyberspace. However, existing bio-inspired anomaly …
A parallel social spider algorithm based on population mining
Z Huang, YM Chen, TL Huang - Applied Soft Computing, 2024 - Elsevier
The social spider algorithm is a meta-heuristic algorithm inspired by the foraging behavior of
biological social spiders, and is initially used to solve optimization problems with continuous …
biological social spiders, and is initially used to solve optimization problems with continuous …
Smart Healthcare Applications: Detecting DDoS Attacks Efficiently using Hybrid Firefly Algorithm
G Sripriyanka, A Mahendran - Engineering, Technology & Applied …, 2025 - etasr.com
The rapidly growing and emerging Smart Healthcare Applications (SHA) are reducing the
burden on the existing healthcare system caused by limited medical infrastructure and …
burden on the existing healthcare system caused by limited medical infrastructure and …
[PDF][PDF] Chaos detection and mitigation in swarm of drones using machine learning techniques and chaotic attractors
Most existing identification and tackling of chaos in swarm drone missions focus on single
drone scenarios. There is a need to assess the status of a system with multiple drones …
drone scenarios. There is a need to assess the status of a system with multiple drones …
An assessment of security techniques for denial of service attack in virtualized environments
AS Ayanboye, JE Efiong, GE Alilu… - 2022 5th Information …, 2022 - ieeexplore.ieee.org
By establishing various simulated environments or specialized resources, a virtual
environment enables users to interact with both the computing environment and the work of …
environment enables users to interact with both the computing environment and the work of …
[PDF][PDF] Journal of Computing, Science &Technology
Mobility, ease of accessibility, and portability have continued to grant ease in the adoption
rise of smartphones; while, also proliferating the vulnerability of users that are often …
rise of smartphones; while, also proliferating the vulnerability of users that are often …
Chaos Detection and Mitigation in Swarm of Drones Using Machine Learning Techniques and Chaotic Attractors
N Emmanuel, LS Mistura… - International …, 2022 - search.proquest.com
Most existing identification and tackling of chaos in swarm drone missions focus on single
drone scenarios. There is a need to assess the status of a system with multiple drones …
drone scenarios. There is a need to assess the status of a system with multiple drones …
An Ontology Based Knowledge Representation for Coordinated SS-bots
Collective behaviour empowers biological species to achieve remarkable swarm level
results through distributed actions. For example, social spiders achieve coordinated …
results through distributed actions. For example, social spiders achieve coordinated …
A Parallel Social Spider Algorithm Based on Population Mining
YM CHEN, TL Huang - papers.ssrn.com
The social spider algorithm is a meta-heuristic algorithm inspired by the foraging behavior of
biological social spiders, and is initially used to solve optimization problems with continuous …
biological social spiders, and is initially used to solve optimization problems with continuous …
[PDF][PDF] A Swarm Intelligence Ontology-Based Model for Coordinating Social Spider-Inspired Robotic Devices
LM Madzima, F Matsebula, A Mwanza - researchgate.net
Collective behaviour is known to empower many biological species to achieve remarkable
results through distributed actions. One notable example is the social spider swarm, which …
results through distributed actions. One notable example is the social spider swarm, which …