[HTML][HTML] Industrial digital twins at the nexus of NextG wireless networks and computational intelligence: A survey

S Zeb, A Mahmood, SA Hassan, MDJ Piran… - Journal of Network and …, 2022 - Elsevier
By amalgamating recent communication and control technologies, computing and data
analytics techniques, and modular manufacturing, Industry 4.0 promotes integrating cyber …

A review of human immune inspired algorithms for intrusion detection systems

C Duru, J Ladeji–Osias, K Wandji… - 2022 IEEE World AI …, 2022 - ieeexplore.ieee.org
Security and trust of Information Systems are critical in its design as they directly influence
users' view and acceptance of such systems. Security can be said to be a contextual and …

[PDF][PDF] Web Attack Detection Using the Input Validation Method: DPDA Theory.

OI Khalaf, M Sokiyna, Y Alotaibi… - … Materials & Continua, 2021 - cdn.techscience.cn
A major issue while building web applications is proper input validation and sanitization.
Attackers can quickly exploit errors and vulnerabilities that lead to malicious behavior in web …

A generic cyber immune framework for anomaly detection using artificial immune systems

BJ Bejoy, G Raju, D Swain, B Acharya, YC Hu - Applied Soft Computing, 2022 - Elsevier
Intrusion detection systems play a significant role in computer security. Artificial immune
systems are the prime contender in develo** an anomaly-based intrusion detection …

A bio-inspired reaction against cyberattacks: AIS-powered optimal countermeasures selection

P Nespoli, FG Mármol, JM Vidal - IEEE Access, 2021 - ieeexplore.ieee.org
Nowadays, Information and Communication Technology (ICT) infrastructures play a crucial
role for human beings, providing essential services at astonishing speed. Nevertheless …

[PDF][PDF] A multi-factor authentication-based framework for identity management in cloud applications

W Said, E Mostafa, MM Hassan… - … -Computers Materials & …, 2022 - cdn.techscience.cn
User's data is considered as a vital asset of several organizations. Migrating data to the
cloud computing is not an easy decision for any organization due to the privacy and security …

Development of intrusion detection system using residual feedforward neural network algorithm

K Ramli, N Hayati, E Ihsanto… - … on Research of …, 2021 - ieeexplore.ieee.org
An intrusion detection system (IDS) is required to protect data from security threats that
infiltrate unwanted information via a regular channel, both during storage and transmission …

A Study on Exploring the Level of Awareness of Privacy Concerns and Risks

T Nguyen, G Yeates, T Ly, U Albalawi - Applied Sciences, 2023 - mdpi.com
With the recent increase in phishing attacks and other kinds of malicious activities,
increasing the awareness of security and privacy awareness is arguably one of the best …

An Artificial Immune System for Detecting Network Anomalies Using Hybrid Immune Theories

TS Sobh - Journal of the ACS Advances in Computer Science, 2023 - journals.ekb.eg
Detecting network anomaly attacks is important due to the need for security guarantees,
reliability, and privacy. The human immune mechanisms intelligently detect, fight, and …

Efficient microwave filter design using differential evolution algorithm with chain local search in MOEA/D framework

Z Wang, L Zhang, KL Li, L Qi - IEICE Electronics Express, 2024 - jstage.jst.go.jp
A hybrid multi-objective differential evolution algorithm based on decomposition with a chain
local search strategy (HMODEA/D-CLS) is proposed for electromagnetic (EM) optimization …