Analysis framework of network security situational awareness and comparison of implementation methods

Y Li, G Huang, C Wang, Y Li - EURASIP Journal on Wireless …, 2019 - Springer
Abstract Information technology has penetrated into all aspects of politics, economy, and
culture of the whole society. The information revolution has changed the way of …

Data-driven modeling and learning in science and engineering

FJ Montáns, F Chinesta, R Gómez-Bombarelli… - Comptes Rendus …, 2019 - Elsevier
In the past, data in which science and engineering is based, was scarce and frequently
obtained by experiments proposed to verify a given hypothesis. Each experiment was able …

[图书][B] Cybersecurity analytics

RM Verma, DJ Marchette - 2019 - taylorfrancis.com
Cybersecurity Analytics is for the cybersecurity student and professional who wants to learn
data science techniques critical for tackling cybersecurity challenges, and for the data …

Clustering-based modified ant colony optimizer for internet of vehicles (CACOIOV)

S Ebadinezhad, Z Dereboylu, E Ever - Sustainability, 2019 - mdpi.com
The Internet of Vehicles (IoV) has recently become an emerging promising field of research
due to the increasing number of vehicles each day. IoV is vehicle communications, which is …

Dendritic cell algorithm enhancement using fuzzy inference system for network intrusion detection

N Elisa, L Yang, X Fu, N Naik - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Dendritic cell algorithm (DCA) is an immune-inspired classification algorithm which is
developed for the purpose of anomaly detection in computer networks. The DCA uses a …

Modeling an intrusion detection system based on adaptive immunology

V Alaparthy, SD Morgera - International Journal of Interdisciplinary …, 2019 - igi-global.com
Network security has always has been an area of priority and extensive research. Recent
years have seen a considerable growth in experimenting with biologically inspired …

Moving target defense to improve industrial control system resiliency

AR Chavez - Industrial Control Systems Security and Resiliency …, 2019 - Springer
Historically, control systems have primarily depended upon their isolation from the Internet
and from traditional information technology (IT) networks as a means of maintaining secure …

Design and implementation of negative authentication system

D Dasgupta, AK Nag, D Ferebee, SK Saha… - International Journal of …, 2019 - Springer
Modern society is mostly dependent on online activities like official or social
communications, fund transfers and so on. Unauthorized system access is one of the utmost …

Complete receptor editing operation based on quantum clonal selection algorithm for optimization problems

Y Yang, H Dai, S Gao, Y Wang, D Jia… - IEEJ Transactions on …, 2019 - Wiley Online Library
Clonal selection mechanism, which is the theoretical foundation of clonal selection algorithm
(CSA) and its variants, was proposed for explaining the essential features of adaptive …

Improved hybrid immune clonal selection genetic algorithm and its application in hybrid shop scheduling

G Lou, Z Cai - Cluster Computing, 2019 - Springer
This paper is based on the multi-objective optimization problem of mixed shop scheduling
problem, the strong coupling of the maximum flow and the minimum time, and the …