Nature inspired techniques and applications in intrusion detection systems: Recent progress and updated perspective

K Thakur, G Kumar - Archives of Computational Methods in Engineering, 2021 - Springer
Nowadays, it has become a necessity for operational and reliable operation of networks due
to our increased dependency over the network services. However, intruders are …

A systematic review of bio-cyber interface technologies and security issues for internet of bio-nano things

S Zafar, M Nazir, T Bakhshi, HA Khattak, S Khan… - IEEE …, 2021 - ieeexplore.ieee.org
Advances in synthetic biology and nanotechnology have contributed to the design of tools
that can be used to control, reuse, modify, and re-engineer cells' structure, as well as …

[ΒΙΒΛΙΟ][B] HiPEAC Vision 2023

M Duranton, K De Bosschere, B Coppens, C Gamrat… - 2023 - inria.hal.science
The focus of the HiPEAC Vision 2023 is that we are in races, both against time and with the
rest of the world. Technology never stands still. The last few years have once again seen …

An SDN‐based fingerprint hop** method to prevent fingerprinting attacks

Z Zhao, F Liu, D Gong - Security and Communication Networks, 2017 - Wiley Online Library
Fingerprinting attacks are one of the most severe threats to the security of networks.
Fingerprinting attack aims to obtain the operating system information of target hosts to make …

Bio-inspired cybersecurity for wireless sensor networks

S Bitam, S Zeadally, A Mellouk - IEEE Communications …, 2016 - ieeexplore.ieee.org
Rapid advances in information and communication technologies have led to the emergence
of cyber-physical systems (CPSs). Wireless sensor networks (WSNs) play a pivotal role in …

Simulation Investigation on the Thermo-mechanical Coupling of the QT 300 Piston

Y Wang, Y Dong, Y Liu - 2009 Second International …, 2009 - ieeexplore.ieee.org
In this paper, the half solid model of the QT300 piston for the marine diesel engine was
established by Pro/E software, and the finite element analysis model was also established …

[ΒΙΒΛΙΟ][B] Using genetic algorithms to detect security related software parameter chains

CA Odell - 2016 - search.proquest.com
Software configurations govern the operation of computer systems and their applications.
These configurations consist of parameters that can be individually set to control different …

Using evolutionary diversity to identify problematic software parameters

EW Fulp, HD Gage, MR McNiece - 2017 IEEE Security and …, 2017 - ieeexplore.ieee.org
Many computer performance and security issues can be attributed to poor software
configuration settings (misconfigurations). However, finding and resolving errors is …

Evolutionary approaches for resilient surveillance management

R Li, EW Fulp - 2017 IEEE Security and Privacy Workshops …, 2017 - ieeexplore.ieee.org
The efficient management (placement and orientation) of security cameras within a floor
plan is a well-known and difficult problem that has gained attention recently. The objective is …

[ΒΙΒΛΙΟ][B] A Study on the Adaptability of Immune System Principles to Wireless Sensor Network and IoT Security

V Alaparthy - 2018 - search.proquest.com
Network security has always been an area of priority and extensive research. Recent years
have seen a considerable growth in experimentation with biologically inspired techniques …