Securing the internet of things in the age of machine learning and software-defined networking

F Restuccia, S D'oro, T Melodia - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) realizes a vision where billions of interconnected devices are
deployed just about everywhere, from inside our bodies to the most remote areas of the …

How Artificial Intelligence and machine learning research impacts payment card fraud detection: A survey and industry benchmark

NF Ryman-Tubb, P Krause, W Garn - Engineering Applications of Artificial …, 2018 - Elsevier
The core goal of this paper is to identify guidance on how the research community can better
transition their research into payment card fraud detection towards a transformation away …

Clustering algorithm for internet of vehicles (IoV) based on dragonfly optimizer (CAVDO)

F Aadil, W Ahsan, ZU Rehman, PA Shah, S Rho… - The Journal of …, 2018 - Springer
Internet of vehicles (IoV) is a branch of the internet of things (IoT) which is used for
communication among vehicles. As vehicular nodes are considered always in motion …

A multi-level intrusion detection system for wireless sensor networks based on immune theory

VT Alaparthy, SD Morgera - IEEE Access, 2018 - ieeexplore.ieee.org
The human body has been, and will continue to be, a source of inspiration for researchers
across various disciplines owing to its robustness and myriad of functions. While some of …

A novel hybrid bat algorithm for solving continuous optimization problems

Q Liu, L Wu, W Xiao, F Wang, L Zhang - Applied Soft Computing, 2018 - Elsevier
Abstract The Bat Algorithm (BA), which is a global optimization method, performs poorly on
complex continuous optimization problems due to BA's disadvantages such as the …

Multiple-solution optimization strategy for multirobot task allocation

L Huang, Y Ding, MC Zhou, Y Jin… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Multiple solutions are often needed because of different kinds of uncertain failures in a plan
execution process and scenarios for which precise mathematical models and constraints are …

Survey on evolutionary computation methods for cybersecurity of mobile ad hoc networks

J Kusyk, MU Uyar, CS Sahin - Evolutionary Intelligence, 2018 - Springer
In this paper, a comprehensive survey of evolutionary computation (EC) methods for
cybersecurity of mobile ad hoc networks (MANETs) is presented. Typically, EC methods are …

Detecting RTL trojans using artificial immune systems and high level behavior classification

F Zareen, R Karam - 2018 Asian Hardware Oriented Security …, 2018 - ieeexplore.ieee.org
Security assurance in a computer system can be viewed as distinguishing between self and
non-self. Artificial Immune Systems (AIS) are a class of machine learning (ML) techniques …

A robust gene clustering algorithm based on clonal selection in multiobjective optimization framework

Z Zareizadeh, MS Helfroush, A Rahideh… - Expert Systems with …, 2018 - Elsevier
Gene clustering is a prerequisite in the analysis of microarray data where sets of co-
expressed genes are clustered. In this paper, a multi-objective clonal selection optimization …

[PDF][PDF] Robot path planning using gray wolf optimizer

L Doğan, U Yüzgeç - Proceedings-International Conference on …, 2018 - indexive.com
Path planning problem plays an important role in mobile robot works. The robotic systems
use intelligence algorithms to plan the path of the robot from one point to the other point. The …