Continuous metaheuristics for binary optimization problems: An updated systematic literature review
For years, extensive research has been in the binarization of continuous metaheuristics for
solving binary-domain combinatorial problems. This paper is a continuation of a previous …
solving binary-domain combinatorial problems. This paper is a continuation of a previous …
A systematic literature review on swarm intelligence based intrusion detection system: past, present and future
Swarm Intelligence (SI) has proven to be useful in solving issues that are difficult to solve
using traditional mathematical methodologies by using a collective behavior of a …
using traditional mathematical methodologies by using a collective behavior of a …
MPDP k-medoids: Multiple partition differential privacy preserving k-medoids clustering for data publishing in the Internet of Medical Things
Z Zhang, T Wu, X Sun, J Yu - International Journal of …, 2021 - journals.sagepub.com
The tremendous growth of Internet of Medical Things has led to a surge in medical user
data, and medical data publishing can provide users with numerous services. However …
data, and medical data publishing can provide users with numerous services. However …
Metaheuristic techniques in attack and defense strategies for cybersecurity: a systematic review
A Salas-Fernández, B Crawford, R Soto… - Artificial Intelligence for …, 2021 - Springer
Motivated by the increasing interaction in cyberspace, researchers are develo**
optimization in both attack and defense techniques. This optimization is performed using …
optimization in both attack and defense techniques. This optimization is performed using …
CEMP-IR: a novel location aware cache invalidation and replacement policy
Earlier mobile client cache invalidation-replacement policies used in the location-based
information system are not appropriate if the path for the client movement is changing …
information system are not appropriate if the path for the client movement is changing …
Automated network intrusion detection using multimodal networks
Intrusion detection requires accurate and timely detection of any bad connection that intends
to exploit network vulnerabilities. Previous approaches have focused on deriving statistical …
to exploit network vulnerabilities. Previous approaches have focused on deriving statistical …
A Secure File Sharing and Audit Trail Tracking Platform with Advanced Encryption Standard for Cloud-Based Environments
M Jagadeeswari, PN Karthi… - 2023 4th International …, 2023 - ieeexplore.ieee.org
In the digital era, organizations, especially financial institutions, place an increasing
emphasis on data security and privacy. To maintain data confidentiality, availability, and …
emphasis on data security and privacy. To maintain data confidentiality, availability, and …
A dynamic configuration with a shared knowledge centre for multi-objective ant colony optimisation algorithms
This paper proposes a dynamic configuration approach to the ant colony optimisation
algorithm configuration, applied to multi-objective optimisation problems. Indeed, the inertia …
algorithm configuration, applied to multi-objective optimisation problems. Indeed, the inertia …
Approches bio-inspirées pour la détection d'intrusions dans un réseau d'ordinateurs
W Guendouzi - 2017 - ccdz.cerist.dz
Résumé La détection d'intrusions peut être vue comme une tâche de classification qui vise à
déterminer la nature intrusive ou normale des comportements d'un système informatique en …
déterminer la nature intrusive ou normale des comportements d'un système informatique en …