Anonymization techniques for privacy preserving data publishing: A comprehensive survey

A Majeed, S Lee - IEEE access, 2020 - ieeexplore.ieee.org
Anonymization is a practical solution for preserving user's privacy in data publishing. Data
owners such as hospitals, banks, social network (SN) service providers, and insurance …

Security of networked control systems subject to deception attacks: A survey

ZH Pang, LZ Fan, H Guo, Y Shi, R Chai… - … Journal of Systems …, 2022 - Taylor & Francis
A networked control system (NCS), which integrates various physical components by
utilising communication networks, is a complex intelligent control system with high flexibility …

Matrix-based evolutionary computation

ZH Zhan, J Zhang, Y Lin, JY Li, T Huang… - … on Emerging Topics …, 2021 - ieeexplore.ieee.org
Computational intelligence (CI), including artificial neural network, fuzzy logic, and
evolutionary computation (EC), has rapidly developed nowadays. Especially, EC is a kind of …

[HTML][HTML] Cloud-based multiclass anomaly detection and categorization using ensemble learning

F Shahzad, A Mannan, AR Javed, AS Almadhor… - Journal of Cloud …, 2022 - Springer
The world of the Internet and networking is exposed to many cyber-attacks and threats. Over
the years, machine learning models have progressed to be integrated into many scenarios …

Metaheuristic algorithm for anomaly detection in Internet of Things leveraging on a neural-driven multiagent system

A Forestiero - Knowledge-Based Systems, 2021 - Elsevier
Detecting unusual data, activities and user behaviors is an extremely important task to
acquire relevant security information that allow identifying faults, intrusions and system …

New advancements in cybersecurity: A comprehensive survey

MA Hassan, S Ali, M Imad, S Bibi - Big Data Analytics and Computational …, 2022 - Springer
World is now considered as global village because of interconnected networks. Smart
phones and large computing devices exchange millions of information each day. Information …

Privacy-preserving context-based electric vehicle dispatching for energy scheduling in microgrids: An online learning approach

Y Liu, P Zhou, L Yang, Y Wu, Z Xu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Electric Vehicles (EVs) are beginning to play a key role in the fast developing area of
Internet of Things (IoT). Numerous results have shown the feasibility of vehicle-to-building …

Computational intelligence in intelligent transportation systems: an overview

MD Hina, A Soukane, A Ramdane-Cherif - Innovative trends in …, 2022 - Springer
Computational intelligence refers to the ability of a computing device or machine to learn
specific tasks based on its data and experience. Computational intelligence is invoked as an …

Provably-secure led block cipher diffusion and confusion based on chaotic maps

HM Al-Saadi, I Alshawi - Informatica, 2023 - informatica.si
Lightweight cryptography algorithms have concentrated on key generation's randomness,
unpredictable nature, and complexity to improve the resistance of ciphers. Therefore, the key …

Network security situational awareness based on genetic algorithm in wireless sensor networks

J Zhang - Journal of Sensors, 2022 - Wiley Online Library
How to design an effective and secure user authentication scheme suitable for complex
wireless sensor network (WSN) environments has very important research significance …