共 75 条
[1]
Ahsan M.M., Gupta K.D., Nag A.K., Poudyal S., Kouzani A.Z., Mahmud M.P., Applications and evaluations of bio-inspired approaches in cloud security: a review, IEEE Access, 8, pp. 180799-180814, (2020)
[2]
Johnson A.P., Al-Aqrabi H., Hill R., Bio-inspired approaches to safety and security in iot-enabled cyber-physical systems, Sensors, 20, 3, (2020)
[3]
Fan X., Sayers W., Zhang S., Han Z., Ren L., Chizari H., Review and classification of bio-inspired algorithms and their applications, J Bionic Eng, 17, 3, pp. 611-631, (2020)
[4]
Rauf U., A taxonomy of bio-inspired cyber security approaches: existing techniques and future directions, Arab J Sci Eng, 43, 12, pp. 6693-6708, (2018)
[5]
Saleem K., Alabduljabbar G.M., Alrowais N., Al-Muhtadi J., Imran M., Rodrigues J.J., Bio-inspired network security for 5G-enabled IoT applications, IEEE Access, 8, pp. 229152-229160, (2020)
[6]
Namasudra S., Devi D., Kadry S., Sundarasekar R., Shanthini A., Towards DNA based data security in the cloud computing environment, Comput Commun, 151, pp. 539-547, (2020)
[7]
Forestiero A., Metaheuristic algorithm for anomaly detection in Internet of Things leveraging on a neural-driven multiagent system, Knowl-Based Syst, 228, (2021)
[8]
Thabit F., Alhomdy S., Jagtap S., A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions, Int J Intell Netw, 2, pp. 18-33, (2021)
[9]
Murali R., Velayutham C.S., A conceptual direction on automatically evolving computer malware using genetic and evolutionary algorithms, 2020 International Conference on Inventive Computation Technologies (ICICT), pp. 226-229, (2020)
[10]
Alzaqebah A., Aljarah I., Al-Kadi O., Damasevicius R., A modified Grey Wolf Optimization algorithm for an intrusion detection system, Mathematics, 10, 6, (2022)