Product and technology innovation: What can biomimicry inspire?

E Lurie-Luke - Biotechnology advances, 2014 - Elsevier
Biomimicry (bio-meaning life in Greek, and-mimesis, meaning to copy) is a growing field that
seeks to interpolate natural biological mechanisms and structures into a wide range of …

A taxonomy of bio-inspired cyber security approaches: existing techniques and future directions

U Rauf - Arabian Journal for Science and Engineering, 2018 - Springer
After decades of deploying cyber security systems, it is a well-known fact that the existing
cyber infrastructure has numerous inherent limitations that make the maintenance of the …

Role of swarm and evolutionary algorithms for intrusion detection system: A survey

A Thakkar, R Lohiya - Swarm and evolutionary computation, 2020 - Elsevier
The growth of data and categories of attacks, demand the use of Intrusion Detection System
(IDS) effectively using Machine Learning (ML) and Deep Learning (DL) techniques. Apart …

Ontology-based multi-classification learning for video concept detection

Y Wu, BL Tseng, JR Smith - … and Expo (ICME)(IEEE Cat. No …, 2004 - ieeexplore.ieee.org
In this paper, an ontology-based multi-classification learning algorithm is adopted to detect
concepts in the NIST TREC-2003 video retrieval benchmark which defines 133 video …

Defense on the move: ant-based cyber defense

GA Fink, JN Haack, AD McKinnon… - IEEE Security & …, 2014 - ieeexplore.ieee.org
Many common cyberdefenses (like firewalls and intrusion-detection systems) are static,
giving attackers the freedom to probe them at will. Moving-target defense (MTD) adds …

Trustworthy stigmergic service compositionand adaptation in decentralized environments

A Moustafa, M Zhang, Q Bai - IEEE Transactions on services …, 2014 - ieeexplore.ieee.org
The widespread use of web services in forming complex online applications requires service
composition to cope with highly dynamic and heterogeneous environments. Traditional …

[PDF][PDF] A cyber era approach for building awareness in cyber security for educational system in India

P Saxena, B Kotiyal, RH Goudar - International Journal of …, 2012 - researchgate.net
Cyber security is the activity of protecting information and information systems (networks,
computers, data bases, data centers and applications) with appropriate procedural and …

Security aspects of cyber-physical device safety in assistive environments

SJ Templeton - Proceedings of the 4th International Conference on …, 2011 - dl.acm.org
As more devices that affect their environment come into use, their proper functioning to
protect the welfare of their charges is a concern. Examples include assistive transport …

Biomimicry for natural and synthetic composites and use of machine learning in hierarchical design

M Milazzo, F Libonati, S Zhou, K Guo… - Biomimicry for Materials …, 2022 - Elsevier
Humankind has long studied natural systems to understand their complexity and to find
motivation and inspiration for improving knowledge and design capabilities for a number of …

A self-organising multi-agent system for decentralised forensic investigations

P Kendrick, N Criado, A Hussain, M Randles - Expert Systems with …, 2018 - Elsevier
As network-based threats continue to evolve more rapidly, detecting and responding to
intrusion attempts in real-time requires an increasingly automated and intelligent response …