[HTML][HTML] Industrial digital twins at the nexus of NextG wireless networks and computational intelligence: A survey

S Zeb, A Mahmood, SA Hassan, MDJ Piran… - Journal of Network and …, 2022 - Elsevier
By amalgamating recent communication and control technologies, computing and data
analytics techniques, and modular manufacturing, Industry 4.0 promotes integrating cyber …

[HTML][HTML] Bio-inspired computation for big data fusion, storage, processing, learning and visualization: state of the art and future directions

AI Torre-Bastida, J Díaz-de-Arcaya, E Osaba… - Neural Computing and …, 2021 - Springer
This overview gravitates on research achievements that have recently emerged from the
confluence between Big Data technologies and bio-inspired computation. A manifold of …

Review and classification of bio-inspired algorithms and their applications

X Fan, W Sayers, S Zhang, Z Han, L Ren… - Journal of Bionic …, 2020 - Springer
Scientists have long looked to nature and biology in order to understand and model
solutions for complex real-world problems. The study of bionics bridges the functions …

[HTML][HTML] Challenges of malware detection in the IoT and a review of artificial immune system approaches

H Alrubayyi, G Goteng, M Jaber, J Kelly - Journal of Sensor and Actuator …, 2021 - mdpi.com
The fast growth of the Internet of Things (IoT) and its diverse applications increase the risk of
cyberattacks, one type of which is malware attacks. Due to the IoT devices' different …

Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research

S Aldhaheri, D Alghazzawi, L Cheng, A Barnawi… - Journal of Network and …, 2020 - Elsevier
Abstract As the Internet of Things (IoT) recently attains tremendous popularity, this promising
technology leads to a variety of security challenges. The traditional solutions do not fit the …

Recent trends in computational intelligence for educational big data analysis

AC Ikegwu, HF Nweke, CV Anikwe - Iran Journal of Computer Science, 2024 - Springer
Educational big data analytics and computational intelligence have transformed our
understanding of learning ability and computing power, catalyzing the emergence of …

A systematic review on anomaly detection for cloud computing environments

T Hagemann, K Katsarou - Proceedings of the 2020 3rd Artificial …, 2020 - dl.acm.org
The detection of anomalies in data is a far-reaching field of research which also applies to
the field of cloud computing in several different ways: from the detection of various types of …

Constructing immunized stego-image for secure steganography via artificial immune system

W Li, H Wang, Y Chen, SM Abdullahi… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Adaptive image steganography is the process of embedding secret messages into
undetectable regions of a cover image through the design of a distortion function by a …

Negative selection in anomaly detection—A survey

P Saurabh, B Verma - Computer Science Review, 2023 - Elsevier
The remarkable ability to separate and identify self and non-self in a given problem space,
makes negative selection a fascinating concept of artificial immune system. Therefore …

Watchdog malicious node detection and isolation using deep learning for secured communication in MANET

AS Narmadha, S Maheswari, SN Deepa - Automatika: časopis za …, 2023 - hrcak.srce.hr
Sažetak Mobile Ad-hoc Networks (MANETs) are wireless networks formed dynamically by
connecting or leaving nodes to and from the network without any fixed infrastructure. These …