Product and technology innovation: What can biomimicry inspire?
E Lurie-Luke - Biotechnology advances, 2014 - Elsevier
Biomimicry (bio-meaning life in Greek, and-mimesis, meaning to copy) is a growing field that
seeks to interpolate natural biological mechanisms and structures into a wide range of …
seeks to interpolate natural biological mechanisms and structures into a wide range of …
A taxonomy of bio-inspired cyber security approaches: existing techniques and future directions
U Rauf - Arabian Journal for Science and Engineering, 2018 - Springer
After decades of deploying cyber security systems, it is a well-known fact that the existing
cyber infrastructure has numerous inherent limitations that make the maintenance of the …
cyber infrastructure has numerous inherent limitations that make the maintenance of the …
Role of swarm and evolutionary algorithms for intrusion detection system: A survey
The growth of data and categories of attacks, demand the use of Intrusion Detection System
(IDS) effectively using Machine Learning (ML) and Deep Learning (DL) techniques. Apart …
(IDS) effectively using Machine Learning (ML) and Deep Learning (DL) techniques. Apart …
Ontology-based multi-classification learning for video concept detection
In this paper, an ontology-based multi-classification learning algorithm is adopted to detect
concepts in the NIST TREC-2003 video retrieval benchmark which defines 133 video …
concepts in the NIST TREC-2003 video retrieval benchmark which defines 133 video …
Defense on the move: ant-based cyber defense
Many common cyberdefenses (like firewalls and intrusion-detection systems) are static,
giving attackers the freedom to probe them at will. Moving-target defense (MTD) adds …
giving attackers the freedom to probe them at will. Moving-target defense (MTD) adds …
Trustworthy stigmergic service compositionand adaptation in decentralized environments
A Moustafa, M Zhang, Q Bai - IEEE Transactions on services …, 2014 - ieeexplore.ieee.org
The widespread use of web services in forming complex online applications requires service
composition to cope with highly dynamic and heterogeneous environments. Traditional …
composition to cope with highly dynamic and heterogeneous environments. Traditional …
[PDF][PDF] A cyber era approach for building awareness in cyber security for educational system in India
Cyber security is the activity of protecting information and information systems (networks,
computers, data bases, data centers and applications) with appropriate procedural and …
computers, data bases, data centers and applications) with appropriate procedural and …
Security aspects of cyber-physical device safety in assistive environments
SJ Templeton - Proceedings of the 4th International Conference on …, 2011 - dl.acm.org
As more devices that affect their environment come into use, their proper functioning to
protect the welfare of their charges is a concern. Examples include assistive transport …
protect the welfare of their charges is a concern. Examples include assistive transport …
Biomimicry for natural and synthetic composites and use of machine learning in hierarchical design
Humankind has long studied natural systems to understand their complexity and to find
motivation and inspiration for improving knowledge and design capabilities for a number of …
motivation and inspiration for improving knowledge and design capabilities for a number of …
A self-organising multi-agent system for decentralised forensic investigations
As network-based threats continue to evolve more rapidly, detecting and responding to
intrusion attempts in real-time requires an increasingly automated and intelligent response …
intrusion attempts in real-time requires an increasingly automated and intelligent response …