Sok: Science, security and the elusive goal of security as a scientific pursuit

C Herley, PC Van Oorschot - 2017 IEEE symposium on security …, 2017 - ieeexplore.ieee.org
The past ten years has seen increasing calls to make security research more “scientific”. On
the surface, most agree that this is desirable, given universal recognition of “science” as a …

Applications of artificial immune systems to computer security: A survey

DAB Fernandes, MM Freire, PAP Fazendeiro… - Journal of Information …, 2017 - Elsevier
For the last two decades, artificial immune systems have been studied in various fields of
knowledge. They were shown to be particularly effective tools at detecting anomalous …

Modeling the spread of computer virus via Caputo fractional derivative and the beta-derivative

E Bonyah, A Atangana, MA Khan - Asia Pacific Journal on Computational …, 2017 - Springer
The concept of information science is inevitable in the human development as science and
technology has become the driving force of all economics. The connection of one human …

High performance adaptive system for cyber attacks detection

M Komar, V Kochan, L Dubchak… - 2017 9th IEEE …, 2017 - ieeexplore.ieee.org
To increase the security of intrusion detection system, generalized structure of highly
performance adaptive system for cyber attacks detection was developed. To improve its …

[PDF][PDF] Artificial immune system based intrusion detection systems—a comprehensive review

BJ Bejoy, S Janakiraman - Int J Comput Eng Technol, 2017 - academia.edu
ABSTRACT Intrusion Detection System (IDS) helps us to identify the abnormalities and
attacks that can affect the confidentiality, integrity, and availability of the system or network …

Efficient privacy-preserving general edit distance and beyond

R Zhu, Y Huang - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Edit distance is an important non-linear metric that has many applications ranging from
matching patient genomes to text-based intrusion detection. Depends on the application …

[PDF][PDF] Dynamic Interdependency Models for Cybersecurity of Critical Infrastructures

E Canzani - 2017 - academia.edu
Governments have strongly recognized that critical infrastructures (CIs) play crucial roles in
underpinning economy, security and societal welfare of countries. The proper functioning of …

An artificial immune ecosystem model for hybrid cloud supervision

F Guigou, P Parrend, P Collet - … Complex Systems Digital Campus World E …, 2017 - Springer
In this paper, we propose a new approach to the performance supervision of complex and
heterogeneous infrastructures found in hybrid cloud networks, which typically consist of …

[PDF][PDF] A Linguistic Steganalysis Approach Base on Source Features of Text and Immune Mechanism.

L Zhu - Comput. Inf. Sci., 2017 - pdfs.semanticscholar.org
Abstract linguistic steganalysis is a technique that discovering potentially hidden information
embedded through using linguistically in plain text using. Varieties of syntax and multi …

Monitoring and Control Framework for Advanced Power Plant Systems Using Artificial Intelligence Techniques

GKI Al-Sinbol - 2017 - researchrepository.wvu.edu
This dissertation presents the design, development, and simulation testing of a monitoring
and control framework for dynamic systems using artificial intelligence techniques. A …