Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Applications 2019
DOI: 10.1049/pbse010e_ch1
|View full text |Cite
|
Sign up to set email alerts
|

Nature-inspired analogies and metaphors for cyber security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…However, with securing critical infrastructure, malware detection needs to be optimized and time intelligent as these systems are highly dynamic, complex, and distributed. Nature-inspired metaheuristic algorithms hold the potential to fulfil this much-needed requirement as they can provide effective and fast enough defenses [4]. These algorithms are inspired by the various phenomenon in nature such as ants, dragonfly, bat, firefly, and cuckoo search and are considered useful to solve complex problems without compromising the efficiency of the system being protected [5][6][7].…”
Section: Introductionmentioning
confidence: 99%
“…However, with securing critical infrastructure, malware detection needs to be optimized and time intelligent as these systems are highly dynamic, complex, and distributed. Nature-inspired metaheuristic algorithms hold the potential to fulfil this much-needed requirement as they can provide effective and fast enough defenses [4]. These algorithms are inspired by the various phenomenon in nature such as ants, dragonfly, bat, firefly, and cuckoo search and are considered useful to solve complex problems without compromising the efficiency of the system being protected [5][6][7].…”
Section: Introductionmentioning
confidence: 99%