2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA) 2016
DOI: 10.1109/aina.2016.161
|View full text |Cite
|
Sign up to set email alerts
|

Bio-Inspired Cryptographic Techniques in Information Management Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
34
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
8

Relationship

4
4

Authors

Journals

citations
Cited by 37 publications
(34 citation statements)
references
References 12 publications
0
34
0
Order By: Relevance
“…This is a deviation from what can be observed in normal traffic, such as LAN traffic. Future studies using this anomaly detection approach can utilize techniques of a biological nature to predict behaviour such as artificial neural networks (ANN) or the fuzzy approach [34][35][36][37]. …”
Section: Discussionmentioning
confidence: 99%
“…This is a deviation from what can be observed in normal traffic, such as LAN traffic. Future studies using this anomaly detection approach can utilize techniques of a biological nature to predict behaviour such as artificial neural networks (ANN) or the fuzzy approach [34][35][36][37]. …”
Section: Discussionmentioning
confidence: 99%
“…The development of IT techniques and a need to collect and store increasingly larger sets of secret data resulted in the need to develop new data protection protocols. This is why the class of data sharing algorithms has been enhanced by new solutions, described in the literature as linguistic and biometric threshold schemes …”
Section: Introductionmentioning
confidence: 99%
“…Another class of data sharing schemes are biometric threshold schemes, as proposed in previous works . These algorithms, similarly to the linguistic threshold schemes, have been developed as an extension of classic data concealment schemes.…”
Section: Introductionmentioning
confidence: 99%
“…However, such information can be modified by attackers without any functional changes in executable files . In addition, some malware developers use customized packing code to protect the binary code of their malware . Since various packing techniques, including customized techniques, are used for malware development, packing detection and identification methods should be based on malware binary code characteristics.…”
Section: Introductionmentioning
confidence: 99%