A reliability perspective of the smart grid
K Moslehi, R Kumar - IEEE transactions on smart grid, 2010 - ieeexplore.ieee.org
Increasing complexity of power grids, growing demand, and requirement for greater
reliability, security and efficiency as well as environmental and energy sustainability …
reliability, security and efficiency as well as environmental and energy sustainability …
Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory
Cybersecurity, which is defined as information security aimed at averting cyberattacks, which
are among the main issues caused by the extensive use of networks in industrial control …
are among the main issues caused by the extensive use of networks in industrial control …
[图书][B] Immunological computation: theory and applications
D Dasgupta, F Nino - 2008 - taylorfrancis.com
Clearly, nature has been very effective in creating organisms that are capable of protecting
themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The …
themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The …
Information security strategies: towards an organizational multi-strategy perspective
A Ahmad, SB Maynard, S Park - Journal of Intelligent Manufacturing, 2014 - Springer
There considerable advice in both research and practice oriented literature on the topic of
information security. Most of the discussion in literature focuses on how to prevent security …
information security. Most of the discussion in literature focuses on how to prevent security …
Three branches of negative representation of information: A survey
Negative Representation of Information (NRI) is an emerging topic that is primarily inspired
by the self-nonself discrimination paradigm of the biological immune system, and it is mainly …
by the self-nonself discrimination paradigm of the biological immune system, and it is mainly …
Strategic approach to information security in organizations
S Park, T Ruighaver - 2008 International Conference on …, 2008 - ieeexplore.ieee.org
This paper is about the strategy for organizational information security. Strategy has been
argued important however got little highlight comparing to other fields in information security …
argued important however got little highlight comparing to other fields in information security …
Threat‐oriented security framework in risk management using multiagent system
Present day sophisticated and innovative attacks have resulted in exponentially increasing
security problems. This paper therefore presents a three‐phased threat‐oriented security …
security problems. This paper therefore presents a three‐phased threat‐oriented security …
A multi-layered immune system for graph planarization problem
S Gao, RL Wang, H Tamura, Z Tang - IEICE transactions on …, 2009 - search.ieice.org
This paper presents a new multi-layered artificial immune system architecture using the
ideas generated from the biological immune system for solving combinatorial optimization …
ideas generated from the biological immune system for solving combinatorial optimization …
[PDF][PDF] Intrusion detection system using artificial immune system
Nature and natural organisms have always inspired researchers and scientists for solving
real world issues. And Computer security is no exception. Artificial Immune System inspired …
real world issues. And Computer security is no exception. Artificial Immune System inspired …
Toward a self-adaptive cyberdefense framework in organization
KJ Huang, KH Chiang - Sage Open, 2021 - journals.sagepub.com
Organizations suffer more than ever from the inability to securely manage the information
system, despite their myriad efforts. By introducing a real cyberattack of a bank, this research …
system, despite their myriad efforts. By introducing a real cyberattack of a bank, this research …