[HTML][HTML] Industrial digital twins at the nexus of NextG wireless networks and computational intelligence: A survey
By amalgamating recent communication and control technologies, computing and data
analytics techniques, and modular manufacturing, Industry 4.0 promotes integrating cyber …
analytics techniques, and modular manufacturing, Industry 4.0 promotes integrating cyber …
[HTML][HTML] Bio-inspired computation for big data fusion, storage, processing, learning and visualization: state of the art and future directions
This overview gravitates on research achievements that have recently emerged from the
confluence between Big Data technologies and bio-inspired computation. A manifold of …
confluence between Big Data technologies and bio-inspired computation. A manifold of …
Review and classification of bio-inspired algorithms and their applications
Scientists have long looked to nature and biology in order to understand and model
solutions for complex real-world problems. The study of bionics bridges the functions …
solutions for complex real-world problems. The study of bionics bridges the functions …
[HTML][HTML] Challenges of malware detection in the IoT and a review of artificial immune system approaches
The fast growth of the Internet of Things (IoT) and its diverse applications increase the risk of
cyberattacks, one type of which is malware attacks. Due to the IoT devices' different …
cyberattacks, one type of which is malware attacks. Due to the IoT devices' different …
Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research
Abstract As the Internet of Things (IoT) recently attains tremendous popularity, this promising
technology leads to a variety of security challenges. The traditional solutions do not fit the …
technology leads to a variety of security challenges. The traditional solutions do not fit the …
Recent trends in computational intelligence for educational big data analysis
Educational big data analytics and computational intelligence have transformed our
understanding of learning ability and computing power, catalyzing the emergence of …
understanding of learning ability and computing power, catalyzing the emergence of …
A systematic review on anomaly detection for cloud computing environments
T Hagemann, K Katsarou - Proceedings of the 2020 3rd Artificial …, 2020 - dl.acm.org
The detection of anomalies in data is a far-reaching field of research which also applies to
the field of cloud computing in several different ways: from the detection of various types of …
the field of cloud computing in several different ways: from the detection of various types of …
Constructing immunized stego-image for secure steganography via artificial immune system
W Li, H Wang, Y Chen, SM Abdullahi… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Adaptive image steganography is the process of embedding secret messages into
undetectable regions of a cover image through the design of a distortion function by a …
undetectable regions of a cover image through the design of a distortion function by a …
Negative selection in anomaly detection—A survey
P Saurabh, B Verma - Computer Science Review, 2023 - Elsevier
The remarkable ability to separate and identify self and non-self in a given problem space,
makes negative selection a fascinating concept of artificial immune system. Therefore …
makes negative selection a fascinating concept of artificial immune system. Therefore …
Watchdog malicious node detection and isolation using deep learning for secured communication in MANET
Sažetak Mobile Ad-hoc Networks (MANETs) are wireless networks formed dynamically by
connecting or leaving nodes to and from the network without any fixed infrastructure. These …
connecting or leaving nodes to and from the network without any fixed infrastructure. These …