Continuous metaheuristics for binary optimization problems: An updated systematic literature review

M Becerra-Rozas, J Lemus-Romani… - Mathematics, 2022 - mdpi.com
For years, extensive research has been in the binarization of continuous metaheuristics for
solving binary-domain combinatorial problems. This paper is a continuation of a previous …

A systematic literature review on swarm intelligence based intrusion detection system: past, present and future

DKK Reddy, J Nayak, HS Behera… - … Methods in Engineering, 2024 - Springer
Swarm Intelligence (SI) has proven to be useful in solving issues that are difficult to solve
using traditional mathematical methodologies by using a collective behavior of a …

MPDP k-medoids: Multiple partition differential privacy preserving k-medoids clustering for data publishing in the Internet of Medical Things

Z Zhang, T Wu, X Sun, J Yu - International Journal of …, 2021 - journals.sagepub.com
The tremendous growth of Internet of Medical Things has led to a surge in medical user
data, and medical data publishing can provide users with numerous services. However …

Metaheuristic techniques in attack and defense strategies for cybersecurity: a systematic review

A Salas-Fernández, B Crawford, R Soto… - Artificial Intelligence for …, 2021 - Springer
Motivated by the increasing interaction in cyberspace, researchers are develo**
optimization in both attack and defense techniques. This optimization is performed using …

CEMP-IR: a novel location aware cache invalidation and replacement policy

AK Gupta, U Shanker - International Journal of …, 2021 - inderscienceonline.com
Earlier mobile client cache invalidation-replacement policies used in the location-based
information system are not appropriate if the path for the client movement is changing …

Automated network intrusion detection using multimodal networks

SV **ale, SR Sutar - International Journal of …, 2022 - inderscienceonline.com
Intrusion detection requires accurate and timely detection of any bad connection that intends
to exploit network vulnerabilities. Previous approaches have focused on deriving statistical …

A Secure File Sharing and Audit Trail Tracking Platform with Advanced Encryption Standard for Cloud-Based Environments

M Jagadeeswari, PN Karthi… - 2023 4th International …, 2023 - ieeexplore.ieee.org
In the digital era, organizations, especially financial institutions, place an increasing
emphasis on data security and privacy. To maintain data confidentiality, availability, and …

A dynamic configuration with a shared knowledge centre for multi-objective ant colony optimisation algorithms

M Rhazzaf, T Masrour - International Journal of Intelligent …, 2020 - inderscienceonline.com
This paper proposes a dynamic configuration approach to the ant colony optimisation
algorithm configuration, applied to multi-objective optimisation problems. Indeed, the inertia …

Approches bio-inspirées pour la détection d'intrusions dans un réseau d'ordinateurs

W Guendouzi - 2017 - ccdz.cerist.dz
Résumé La détection d'intrusions peut être vue comme une tâche de classification qui vise à
déterminer la nature intrusive ou normale des comportements d'un système informatique en …