Evolutionary multi-agent systems

A Byrski, R Dreżewski, L Siwik… - The Knowledge …, 2015 - cambridge.org
The aim of this paper is to give a survey on the development and applications of
evolutionary multi-agent systems (EMAS). The paper starts with a general introduction …

[图书][B] Combine Harvesters: theory, modeling, and design

P Miu - 2015 - books.google.com
The design, development, and optimization of modern combine harvesters require a
thorough understanding and a suitable representation (model) of each machine system as …

Securing the internet of things with responsive artificial immune systems

J Greensmith - Proceedings of the 2015 annual conference on genetic …, 2015 - dl.acm.org
The Internet of Things is a network ofsmart'objects, transforming everyday objects into
entities which can measure, sense and understand their environment. The devices are …

A holistic smart home demonstrator for anomaly detection and response

J Lundström, WO De Morais… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Applying machine learning methods in scenarios involving smart homes is a complex task.
The many possible variations of sensors, feature representations, machine learning …

[PDF][PDF] Design of an intrusion detection system for unknown-attacks based on bio-inspired algorithms

KM Kim, H Kim, K Kim - Proc. Comput. Secur. Symp, 2015 - caislab.kaist.ac.kr
Abstract Signature-based Intrusion Detection System (IDS) can detect only known attacks
that have signatures. As new unknown-attacks are appearing continuously, the detection of …

Homeostatic-inspired controller algorithm for a hybrid-driven autonomous underwater glider

K Isa - 2015 - eprints.uthm.edu.my
The autonomous hybrid-driven underwater glider presented in this thesis combines the
concept of a buoyancy-driven underwater glider and a conventional autonomous …

[PDF][PDF] Semantic cluster based classification for data leakage detection for the cloud security

CS Kumar, K Iyakutty - International Journal of Computer Applications, 2015 - Citeseer
ABSTRACT A novel approach for the data leak detection in the cloud environment is
discussed in this paper. The paper uses the semantic based clustering for the anomaly …

[PDF][PDF] Survey: biological inspired computing in the network security

VV Ramana, YS Reddy, GRS Reddy, P Ravi - International Journal of …, 2015 - Citeseer
------------------------------------------------------------------ABSTRACT--------------------------------------------
--------------------Traditional computing techniques and systems consider a main process …

[PDF][PDF] Security Applications of Peer-to-Peer Networks Ѓ н

V Vlachos, S Androutsellis-Theotokis, D Spinellis - academia.edu
Open networks are often insecure and provide an opportunity for viruses and DDOS
activities to spread. To make such networks more resilient against these kind of threats, we …

[PDF][PDF] An Immune-Inspired Approach to Anomaly Detection Jamie Twycross, University of Nottingham, UK

U Aickelin - academia.edu
The immune system provides a rich metaphor for computer security: anomaly detection that
works in nature should work for machines. However, early artificial immune system …