The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence
暂无分享,去创建一个
Ashutosh Tiwari | Tim Watson | Yaochu Jin | Bogdan Gabrys | Carsten Maple | Jörn Mehnen | Hongmei He | A. Tiwari | Yaochu Jin | Hongmei He | C. Maple | T. Watson | B. Gabrys | J. Mehnen
[1] Martin Christopher,et al. Logistics and supply chain management : creating value-adding networks , 2005 .
[2] Zbigniew Kotulski,et al. Optimization of TLS security protocol using the adaptable security model , 2009, Ann. UMCS Informatica.
[3] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[4] Eugene Fink,et al. Detection of Internet scam using logistic regression , 2011, 2011 IEEE International Conference on Systems, Man, and Cybernetics.
[5] Yen-Kuang Chen,et al. Challenges and opportunities of internet of things , 2012, 17th Asia and South Pacific Design Automation Conference.
[6] Spiros Mancoridis,et al. Using code metric histograms and genetic algorithms to perform author identification for software forensics , 2007, GECCO '07.
[7] Bing Liu,et al. Review spam detection , 2007, WWW '07.
[8] Sadie Creese,et al. SuperIdentity: Fusion of Identity across Real and Cyber Domains , 2012 .
[9] Laurence T. Yang,et al. Data Mining for Internet of Things: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[10] Lei Ren,et al. Cloud manufacturing: a new manufacturing paradigm , 2014, Enterp. Inf. Syst..
[11] Hu-Chen Liu,et al. Material selection using an interval 2-tuple linguistic VIKOR method considering subjective and objective weights , 2013 .
[12] Wei Li,et al. Using Genetic Algorithm for Network Intrusion Detection , 2004 .
[13] Yan Zhu,et al. Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain , 2007 .
[14] Tim Oates,et al. Detecting Spam Blogs: A Machine Learning Approach , 2006, AAAI.
[15] Bob Rudis,et al. Data-Driven Security: Analysis, Visualization and Dashboards , 2014 .
[16] Sulaiman Al Amro,et al. Evolutionary Computation in Computer Security and Forensics: An Overview , 2012, Computational Intelligence for Privacy and Security.
[17] Kagermann Henning. Recommendations for implementing the strategic initiative INDUSTRIE 4.0 , 2013 .
[18] Padmini Srinivasan,et al. Spam detection in online classified advertisements , 2011, WebQuality '11.
[19] Sébastien Marcel,et al. Bi-Modal Face and Speech Authentication: a BioLogin Demonstration System , 2006 .
[20] Michael Wagner,et al. Audio-visual multimodal fusion for biometric person authentication and liveness verification , 2006 .
[21] Tanupriya Choudhury,et al. Securing the Internet of Things: A proposed framework , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).
[22] Oscar Cordón,et al. Craniofacial Superimposition in Forensic Identification using Genetic Algorithms , 2007, Third International Symposium on Information Assurance and Security.
[23] A. Sima Etaner-Uyar,et al. Detection of DDoS Attacks via an Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm , 2010, EvoApplications.
[24] Anil K. Jain,et al. Likelihood Ratio-Based Biometric Score Fusion , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[25] Konstantin Tretyakov,et al. Machine Learning Techniques in Spam Filtering , 2004 .