2022
DOI: 10.1007/s42979-022-01292-w
|View full text |Cite|
|
Sign up to set email alerts
|

Bio-inspired Computing Techniques for Data Security Challenges and Controls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 65 publications
0
0
0
Order By: Relevance
“…The second is the best global answer, which the swarm of particles has discovered thus far. As a result, each particle has its best personal answer, as well as the best global solution stored in its memory [38]- [40].…”
Section: Particle Swarm Optimizationmentioning
confidence: 99%
“…The second is the best global answer, which the swarm of particles has discovered thus far. As a result, each particle has its best personal answer, as well as the best global solution stored in its memory [38]- [40].…”
Section: Particle Swarm Optimizationmentioning
confidence: 99%