A reliability perspective of the smart grid

K Moslehi, R Kumar - IEEE transactions on smart grid, 2010 - ieeexplore.ieee.org
Increasing complexity of power grids, growing demand, and requirement for greater
reliability, security and efficiency as well as environmental and energy sustainability …

Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory

APH de Gusmão, MM Silva, T Poleto, LC e Silva… - International Journal of …, 2018 - Elsevier
Cybersecurity, which is defined as information security aimed at averting cyberattacks, which
are among the main issues caused by the extensive use of networks in industrial control …

[图书][B] Immunological computation: theory and applications

D Dasgupta, F Nino - 2008 - taylorfrancis.com
Clearly, nature has been very effective in creating organisms that are capable of protecting
themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The …

Information security strategies: towards an organizational multi-strategy perspective

A Ahmad, SB Maynard, S Park - Journal of Intelligent Manufacturing, 2014 - Springer
There considerable advice in both research and practice oriented literature on the topic of
information security. Most of the discussion in literature focuses on how to prevent security …

Three branches of negative representation of information: A survey

W Luo, R Liu, H Jiang, D Zhao… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Negative Representation of Information (NRI) is an emerging topic that is primarily inspired
by the self-nonself discrimination paradigm of the biological immune system, and it is mainly …

Strategic approach to information security in organizations

S Park, T Ruighaver - 2008 International Conference on …, 2008 - ieeexplore.ieee.org
This paper is about the strategy for organizational information security. Strategy has been
argued important however got little highlight comparing to other fields in information security …

Threat‐oriented security framework in risk management using multiagent system

P Bedi, V Gandotra, A Singhal… - Software: Practice …, 2013 - Wiley Online Library
Present day sophisticated and innovative attacks have resulted in exponentially increasing
security problems. This paper therefore presents a three‐phased threat‐oriented security …

A multi-layered immune system for graph planarization problem

S Gao, RL Wang, H Tamura, Z Tang - IEICE transactions on …, 2009 - search.ieice.org
This paper presents a new multi-layered artificial immune system architecture using the
ideas generated from the biological immune system for solving combinatorial optimization …

[PDF][PDF] Intrusion detection system using artificial immune system

I Dutt, S Borah, I Maitra - International Journal of Computer …, 2016 - researchgate.net
Nature and natural organisms have always inspired researchers and scientists for solving
real world issues. And Computer security is no exception. Artificial Immune System inspired …

Toward a self-adaptive cyberdefense framework in organization

KJ Huang, KH Chiang - Sage Open, 2021 - journals.sagepub.com
Organizations suffer more than ever from the inability to securely manage the information
system, despite their myriad efforts. By introducing a real cyberattack of a bank, this research …