Applications and Evaluations of Bio-Inspired Approaches in Cloud Security: A Review
暂无分享,去创建一个
Abbas Z. Kouzani | Kishor Datta Gupta | M. A. Parvez Mahmud | Subash Poudyal | Abhijit Kumar Nag | Md Manjurul Ahsan | A. Kouzani | M. Ahsan | M. P. Mahmud | A. Nag | Subash Poudyal
[1] Kim-Kwang Raymond Choo,et al. A Deep CNN Ensemble Framework for Efficient DDoS Attack Detection in Software Defined Networks , 2020, IEEE Access.
[2] Heung-Il Suk,et al. Person authentication from neural activity of face-specific visual self-representation , 2013, Pattern Recognit..
[3] Sanjay Kumar,et al. A New User Identity Based Authentication, Using Security and Distributed for Cloud Computing , 2020, IOP Conference Series: Materials Science and Engineering.
[4] Muddassar Farooq,et al. BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc , 2007, ICARIS.
[5] Dawei Li,et al. An energy-efficient algorithm for virtual machine placement optimization in cloud data centers , 2020, Cluster Computing.
[6] Amir H. Gandomi,et al. Ant Colony Optimization Based Quality of Service Aware Energy Balancing Secure Routing Algorithm for Wireless Sensor Networks , 2021, IEEE Transactions on Engineering Management.
[7] Dipankar Dasgupta,et al. Negative Authentication Systems , 2017 .
[8] Ajith Abraham,et al. Web usage mining using artificial ant colony clustering and linear genetic programming , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..
[9] Tao Huang,et al. Service-differentiated QoS routing based on ant colony optimisation for named data networking , 2018, Peer-to-Peer Networking and Applications.
[10] Vallipuram Muthukkumarasamy,et al. An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks , 2015, IEEE Sensors Journal.
[11] John R. Williams,et al. Design and implementation of Negative Authentication System , 2017, International Journal of Information Security.
[12] Luca Maria Gambardella,et al. Swarm intelligence for routing in mobile ad hoc networks , 2005, Proceedings 2005 IEEE Swarm Intelligence Symposium, 2005. SIS 2005..
[13] Waldo Delport,et al. Forensic evidence isolation in clouds , 2014 .
[14] Mohd Faizal Abdollah,et al. Cloud Forensic Challenges and Recommendations: A Review , 2020 .
[15] Salwani Abdullah,et al. A Migration-Based Cuttlefish Algorithm With Short-Term Memory for Optimization Problems , 2020, IEEE Access.
[16] J J Hopfield,et al. Neural networks and physical systems with emergent collective computational abilities. , 1982, Proceedings of the National Academy of Sciences of the United States of America.
[17] Yuval Elovici,et al. A Neural Attention Model for Real-Time Network Intrusion Detection , 2019, 2019 IEEE 44th Conference on Local Computer Networks (LCN).
[18] Manvi Breja,et al. Secure DNA and Morse code based Profile access control models for Cloud Computing Environment , 2020, Procedia Computer Science.
[19] Jong Hyuk Park,et al. Secure Secondary Authentication Framework for Efficient Mutual Authentication on a 5G Data Network , 2020 .
[20] Giovanni Pilato,et al. Verification of Ink-on-paper Fingerprints by Using Image Processing Techniques and a New Matching Operator , 2002 .
[21] Wei-Chi Ku. Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture , 2005, IEEE Transactions on Neural Networks.
[22] Kah Phooi Seng,et al. Classical and swarm intelligence based routing protocols for wireless sensor networks: A survey and comparison , 2012, J. Netw. Comput. Appl..
[23] Wei Jin,et al. Face recognition method based on support vector machine and particle swarm optimization , 2011, Expert Syst. Appl..
[24] Vishwa Teja Alaparthy,et al. A Multi-Level Intrusion Detection System for Wireless Sensor Networks Based on Immune Theory , 2018, IEEE Access.
[25] Ahmed Hamid Mohsin,et al. A Study of 2.5D Face Recognition for Forensic Analysis , 2020 .
[26] Ali Daud,et al. CC-GA: A clustering coefficient based genetic algorithm for detecting communities in social networks , 2018, Appl. Soft Comput..
[27] Kalyanmoy Deb,et al. An Adaptive Approach for Active Multi-Factor Authentication , 2014 .
[28] 네벤카 디미트로바,et al. System for parental control in video programs based on multimedia content information , 2002 .
[29] Ling Tian,et al. Identity-Based Authentication for Cloud Computing , 2009, CloudCom.
[30] Abdulsalam Ya’u Gital,et al. Efficient Metaheuristic Population-Based and Deterministic Algorithm for Resource Provisioning Using Ant Colony Optimization and Spanning Tree , 2020, Int. J. Cloud Appl. Comput..
[31] Mohammed Abo-Zahhad,et al. Mobile Sink-Based Adaptive Immune Energy-Efficient Clustering Protocol for Improving the Lifetime and Stability Period of Wireless Sensor Networks , 2015, IEEE Sensors Journal.
[32] Kazuyuki Mori,et al. Immune Algorithm with Searching Diversity and its Application to Resource Allocation Problem , 1993 .
[33] Vijay Dhir,et al. Hypercube Based Genetic Algorithm for Efficient VM Migration for Energy Reduction in Cloud Computing , 2019, Statistics, Optimization & Information Computing.
[34] Cord Spreckelsen,et al. Privacy-Preserving Deep Learning for the Detection of Protected Health Information in Real-World Data: Comparative Evaluation , 2020, JMIR formative research.
[35] Julie Greensmith,et al. Immune system approaches to intrusion detection – a review , 2004, Natural Computing.
[36] Le Zhang,et al. Developing a Novel Hybrid Biogeography-Based Optimization Algorithm for Multilayer Perceptron Training under Big Data Challenge , 2018, Sci. Program..
[37] Md. Akhtaruzzaman Adnan,et al. Bio-Mimic Optimization Strategies in Wireless Sensor Networks: A Survey , 2013, Sensors.
[38] H.E. Rauch,et al. Neural networks for routing communication traffic , 1988, IEEE Control Systems Magazine.
[39] Gaby Abou Haidar,et al. High Perception Intrusion Detection System Using Neural Networks , 2015, 2015 Ninth International Conference on Complex, Intelligent, and Software Intensive Systems.
[40] Quan-Ke Pan,et al. An improved fruit fly optimization algorithm for solving the multidimensional knapsack problem , 2017, Appl. Soft Comput..
[41] Kishor Datta Gupta,et al. A Genetic Algorithm Approach to Optimize Dispatching for A Microgrid Energy System with Renewable Energy Sources , 2019 .
[42] Vir V. Phoha,et al. Neural network-based reputation model in a distributed system , 2004, Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004..
[43] Philip Hingston,et al. Evolving statistical rulesets for network intrusion detection , 2015, Appl. Soft Comput..
[44] Joe Carthy,et al. Cloud Computing Reference Architecture and Its Forensic Implications: A Preliminary Analysis , 2012, ICDF2C.
[45] Mounir Ghogho,et al. Deep Recurrent Neural Network for Intrusion Detection in SDN-based Networks , 2018, 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft).
[46] Anshu Parashar,et al. Secure User Data in Cloud Computing Using Encryption Algorithms , 2013 .
[47] Zhu Wang,et al. A research using hybrid RBF/Elman neural networks for intrusion detection system secure model , 2009, Comput. Phys. Commun..
[48] Maria Dolores Gil Montoya,et al. A Pareto-based multi-objective evolutionary algorithm for automatic rule generation in network intrusion detection systems , 2013, Soft Comput..
[49] M. Tahar Kechadi,et al. Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results , 2013, Digit. Investig..
[50] L. D. Dhinesh Babu,et al. A firefly swarm approach for establishing new connections in social networks based on big data analytics , 2015, Int. J. Commun. Networks Distributed Syst..
[51] Xiao Lu,et al. Negative Purchase Intent Identification in Twitter , 2020, WWW.
[52] ChenKai,et al. Multi-key privacy-preserving deep learning in cloud computing , 2017 .
[53] Mauro Birattari,et al. Swarm Intelligence , 2012, Lecture Notes in Computer Science.
[54] Dongmei Zhang,et al. AATMS: An Anti-Attack Trust Management Scheme in VANET , 2020, IEEE Access.
[55] Min-Shiang Hwang,et al. A remote password authentication scheme for multiserver architecture using neural networks , 2001, IEEE Trans. Neural Networks.
[56] Dipankar Dasgupta,et al. Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks , 2021, SN Comput. Sci..
[57] Ramesh C. Poonia,et al. A performance evaluation of routing protocols for vehicular ad hoc networks with swarm intelligence , 2018, Int. J. Syst. Assur. Eng. Manag..
[58] Mohammad S. Obaidat,et al. An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks , 2009, Secur. Commun. Networks.
[59] Abdul Wahid,et al. Intrusion Detection and Prevention on Flow of Big Data Using Bacterial Foraging , 2015 .
[60] Dipankar Dasgupta,et al. An Overview of Artificial Immune Systems and Their Applications , 1993 .
[61] Shuyu Li,et al. Research on a Privacy Preserving Clustering Method for Social Network , 2019, 2019 IEEE 4th International Conference on Cloud Computing and Big Data Analysis (ICCCBDA).
[62] Dan Pei,et al. ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications.
[63] Longbing Cao,et al. Novel Intrusion Detection using Probabilistic Neural Network and Adaptive Boosting , 2009, ArXiv.
[64] Ajay K. Sharma,et al. Genetic Algorithm-based Optimized Cluster Head selection for single and multiple data sinks in Heterogeneous Wireless Sensor Network , 2019, Appl. Soft Comput..
[65] Sevil Sen,et al. Evolving Trust Formula to Evaluate Data Trustworthiness in VANETs Using Genetic Programming , 2019, EvoApplications.
[66] Ramachandra Raghavendra,et al. Multisensor biometric evidence fusion of face and palmprint for person authentication using Particle Swarm Optimisation (PSO) , 2010, Int. J. Biom..
[67] Ozgur Koray Sahingoz,et al. Neural network based intrusion detection systems with different training functions , 2018, 2018 6th International Symposium on Digital Forensic and Security (ISDFS).
[68] Athman Bouguettaya,et al. Genetic Algorithm Based QoS-Aware Service Compositions in Cloud Computing , 2011, DASFAA.
[69] Vassil Roussev,et al. Cloud forensics-Tool development studies & future outlook , 2016, Digit. Investig..
[70] Li Tao. An Immune Based Model for Network Monitoring , 2006 .
[71] Lei Chen,et al. Intrusion detection and security calculation in industrial cloud storage based on an improved dynamic immune algorithm , 2019, Inf. Sci..
[72] Chou-Yuan Lee,et al. A hybrid search algorithm with heuristics for resource allocation problem , 2005, Inf. Sci..
[73] Jason Brownlee,et al. Clever Algorithms: Nature-Inspired Programming Recipes , 2012 .
[74] Luis Rodero-Merino,et al. Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.
[75] John R. Williams,et al. G-NAS: A grid-based approach for negative authentication , 2014, 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[76] The Writer OF The Article,et al. The Origin of Species , 1871, Nature.
[77] Barbara Webb,et al. Swarm Intelligence: From Natural to Artificial Systems , 2002, Connect. Sci..
[78] Vatsala Vijayan,et al. Artificial Neural Network (ANN): An Artificial Intelligent (AI) Tool to Predict Fraudulent Financial Reporting and Financial Distress , 2020 .
[79] Hsiangting Shatina Chen,et al. The inhospitable vulnerability , 2018, Journal of Hospitality and Tourism Technology.
[80] A. Sampathkumar,et al. Glowworm swarm optimization for effectual load balancing and routing strategies in wireless sensor networks , 2020, Wirel. Networks.
[81] Ali A. Ghorbani,et al. Improved competitive learning neural networks for network intrusion and fraud detection , 2012, Neurocomputing.
[82] Zulaiha Ali Othman,et al. 2.5 D Facial Analysis via Bio-Inspired Active Appearance Model and Support Vector Machine for Forensic Application , 2017 .
[83] Pratyay Kuila,et al. Nature-Inspired Algorithms for k-Coverage and m-Connectivity Problems in Wireless Sensor Networks , 2019, Lecture Notes in Networks and Systems.
[84] Md. Abu Naser Bikas,et al. An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.
[85] Norman W. Paton,et al. Optimizing virtual machine placement for energy and SLA in clouds using utility functions , 2016, Journal of Cloud Computing.
[86] Xiaohong Yuan,et al. Applying Long Short-Term Memory Recurrent Neural Network for Intrusion Detection , 2018, SoutheastCon 2018.
[87] Shucheng Yu,et al. Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[88] Vidushi Sharma,et al. Heuristic Load Balancing Algorithms in Vulnerable Cloud Computing Environment , 2018, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).
[89] Tommy W. S. Chow,et al. A recurrent neural-network-based real-time learning control strategy applying to nonlinear systems with unknown dynamics , 1998, IEEE Trans. Ind. Electron..
[90] Deevi Radha Rani,et al. Challenges of Digital Forensics in Cloud Computing Environment , 2016 .
[91] Jan H. P. Eloff,et al. An approach to implement a network intrusion detection system using genetic algorithms , 2004 .
[92] Andrew H. Sung,et al. Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligence Techniques , 2003, Int. J. Digit. EVid..
[93] Kishor Datta Gupta,et al. Leveraging Machine Learning Approach to Setup Software-Defined Network(SDN) Controller Rules During DDoS Attack , 2018, IJCCI.
[94] L. G. Malik,et al. An approach towards digital forensic framework for cloud , 2014, 2014 IEEE International Advance Computing Conference (IACC).
[95] Mohammad S. Obaidat,et al. An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks , 2010, J. Syst. Softw..
[96] Faouzi Kamoun,et al. Neural networks for shortest path computation and routing in computer networks , 1993, IEEE Trans. Neural Networks.
[97] Dipankar Dasgupta,et al. Toward the design of adaptive selection strategies for multi-factor authentication , 2016, Comput. Secur..
[98] Omar Almomani,et al. Improved Security Particle Swarm Optimization (PSO) Algorithm to Detect Radio Jamming Attacks in Mobile Networks , 2020 .
[99] Dipankar Dasgupta,et al. Advances in User Authentication , 2017, Infosys Science Foundation Series.
[100] Tianbo Lu,et al. Next Big Thing in Big Data: The Security of the ICT Supply Chain , 2013, 2013 International Conference on Social Computing.
[101] Katia Obraczka,et al. Energy-efficient collision-free medium access control for wireless sensor networks , 2003, SenSys '03.
[102] Ming Cao,et al. Swarm Intelligence Algorithms for Weapon-Target Assignment in a Multilayer Defense Scenario: A Comparative Study , 2020, Symmetry.
[103] Keke Gai,et al. Cost-Aware Multimedia Data Allocation for Heterogeneous Memory Using Genetic Algorithm in Cloud Computing , 2020, IEEE Transactions on Cloud Computing.
[104] John H. Hartman,et al. The Swarm scalable storage system , 1999, Proceedings. 19th IEEE International Conference on Distributed Computing Systems (Cat. No.99CB37003).
[105] Ganesh Chandra Deka,et al. Handbook of Research on Securing Cloud-Based Databases with Biometric Applications , 2014 .
[106] Donghai Guan,et al. Optimized Trust-Aware Recommender System using Genetic Algorithm , 2017 .
[107] Saurabh Shah,et al. Exploration of Vulnerabilities, Threats and Forensic Issues and its impact on the Distributed Environment of Cloud and its mitigation , 2020 .
[108] PanQuan-Ke,et al. An improved fruit fly optimization algorithm for solving the multidimensional knapsack problem , 2017 .
[109] Ali Balador,et al. Malicious Node Detection in Vehicular Ad-Hoc Network Using Machine Learning and Deep Learning , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).
[110] Dipankar Dasgupta,et al. Shamir's Secret Sharing for Authentication without Reconstructing Password , 2020, 2020 10th Annual Computing and Communication Workshop and Conference (CCWC).
[111] Joydev Ghosh,et al. Features Extraction for Network Intrusion Detection Using Genetic Algorithm (GA) , 2020 .
[112] Wen-Guey Tzeng,et al. A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy , 2002, IEEE Trans. Knowl. Data Eng..
[113] Georgios Kambourakis,et al. Dendron : Genetic trees driven rule induction for network intrusion detection systems , 2018, Future Gener. Comput. Syst..
[114] John Zic,et al. A Cloud Architecture of Virtual Trusted Platform Modules , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[115] Sungzoon Cho,et al. GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[116] Yi Yue,et al. Traffic-Aware and Reliability-Guaranteed Virtual Machine Placement Optimization in Cloud Datacenters , 2019, 2019 IEEE 12th International Conference on Cloud Computing (CLOUD).
[117] Zijing Mao,et al. EEG-based biometric identification with convolutional neural network , 2019, Multimedia Tools and Applications.
[118] Michael L. Littman,et al. Packet Routing in Dynamically Changing Networks: A Reinforcement Learning Approach , 1993, NIPS.
[119] Lathies Bhasker. Genetically derived secure cluster-based data aggregation in wireless sensor networks , 2014, IET Inf. Secur..
[120] Xiaoping Wu,et al. Cloud Computing System Based on Trusted Computing Platform , 2010, 2010 International Conference on Intelligent Computation Technology and Automation.
[121] Hussein Al-Zoubi. Efficient Task Scheduling for Applications on Clouds , 2019, 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom).
[122] Nour Moustafa,et al. Enhancing network forensics with particle swarm and deep learning: The particle deep framework , 2020, 7th International Conference on Artificial Intelligence and Applications.
[123] Dipankar Dasgupta,et al. An Investigation of Negative Authentication Systems 1 , 2008 .
[124] Siyang Zhang,et al. A novel hybrid KPCA and SVM with GA model for intrusion detection , 2014, Appl. Soft Comput..
[125] Ahmed Aliyu,et al. Energy-efficient Virtual Machine Allocation Technique Using Flower Pollination Algorithm in Cloud Datacenter: A Panacea to Green Computing , 2019, Journal of Bionic Engineering.
[126] F. Xu,et al. A broker-assisting trust and reputation system based on artificial neural network , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.
[127] Gurpreet Singh Chhabra,et al. Efficient fuzzy ant colony-based multipath QoS aware routing protocol in mobile ad hoc network , 2018 .
[128] Yuanman Li,et al. Privacy-Preserving distributed deep learning based on secret sharing , 2020, Inf. Sci..
[129] Osman Ghazali,et al. Trust Management in Cloud Computing: A Critical Review , 2012, ArXiv.
[130] Guangyi Cao,et al. Topology-aware multi-objective virtual machine dynamic consolidation for cloud datacenter , 2019, Sustain. Comput. Informatics Syst..
[131] Susan M. Bridges,et al. FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .
[132] Jun Zhang,et al. An Energy Efficient Ant Colony System for Virtual Machine Placement in Cloud Computing , 2018, IEEE Transactions on Evolutionary Computation.
[133] Manoj Duhan,et al. An effective implementation of security based algorithmic approach in mobile adhoc networks , 2014, Human-centric Computing and Information Sciences.
[134] Muddassar Farooq,et al. Routing Protocols for Next-Generation Networks Inspired by Collective Behaviors of Insect Societies: An Overview , 2008, Swarm Intelligence.
[135] Ahmet Burak Can,et al. GenTrust: A genetic trust management model for peer-to-peer systems , 2015, Appl. Soft Comput..
[136] NamUk Kim,et al. Attribute Relationship Evaluation Methodology for Big Data Security , 2013, 2013 International Conference on IT Convergence and Security (ICITCS).
[137] Dipankar Dasgupta,et al. Smart Crowdsourcing Based Content Review System (SCCRS): An Approach to Improve Trustworthiness of Online Contents , 2018, CSoNet.
[138] Maolin Tang,et al. A Hybrid Genetic Algorithm for the Energy-Efficient Virtual Machine Placement Problem in Data Centers , 2014, Neural Processing Letters.
[139] D. P. Gaikwad,et al. Real time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA , 2016, 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT).
[140] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[141] Tao Wang,et al. EEG Signal Processing Based on Genetic Algorithm for Extracting Mixed Features , 2019, Int. J. Pattern Recognit. Artif. Intell..
[142] Min Lei,et al. MTBAC: A mutual trust based access control model in Cloud computing , 2014, China Communications.
[143] Nina H. Fefferman,et al. A Case Study in Tailoring a Bio-Inspired Cyber-Security Algorithm: Designing Anomaly Detection for Multilayer Networks , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[144] Sangjin Lee,et al. Digital forensic investigation of cloud storage services , 2012, Digit. Investig..
[145] Basem E. Elnaghi,et al. Osmotic Bio-Inspired Load Balancing Algorithm in Cloud Computing , 2019, IEEE Access.
[146] Xu Sun,et al. A Security Aware Fuzzy Enhanced Reliable Ant Colony Optimization Routing in Vehicular Ad hoc Networks , 2018, 2018 IEEE Intelligent Vehicles Symposium (IV).
[147] Oleg Starostenko,et al. Intrusion Detection and Classification of Attacks in High-Level Network Protocols Using Recurrent Neural Networks , 2008, TeNe.
[148] Yuanquan Shi,et al. Anomaly Detection for Network Flow Using Immune Network and Density Peak , 2020, Int. J. Netw. Secur..
[149] Dhananjay Singh,et al. Developing a Cloud Computing Data Center Virtual Machine Consolidation Based on Multi-objective Hybrid Fruit-fly Cuckoo Search Algorithm , 2018, 2018 IEEE 5G World Forum (5GWF).
[150] JoyceRick,et al. Identity authentication based on keystroke latencies , 1990 .