Applications and evaluations of bio-inspired approaches in cloud security: A review
Version 2 2024-06-04, 04:49Version 2 2024-06-04, 04:49
Version 1 2020-11-01, 22:16Version 1 2020-11-01, 22:16
journal contribution
posted on 2024-06-04, 04:49 authored by MM Ahsan, KD Gupta, AK Nag, S Poudyal, Abbas KouzaniAbbas Kouzani, MAP MahmudApplications and evaluations of bio-inspired approaches in cloud security: A review
History
Journal
IEEE AccessVolume
8Pagination
180799-180814Location
Piscataway, N.J.Publisher DOI
Open access
- Yes
Link to full text
ISSN
2169-3536eISSN
2169-3536Language
EnglishPublication classification
C1 Refereed article in a scholarly journalPublisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCUsage metrics
Categories
No categories selectedKeywords
Science & TechnologyTechnologyComputer Science, Information SystemsEngineering, Electrical & ElectronicTelecommunicationsComputer ScienceEngineeringHeuristic algorithmsCloud computing securityImmune systemAuthenticationEvolutionary computationCloud computingcybersecurityevolutionary algorithmswarm intelligenceneural networkPASSWORD AUTHENTICATION SCHEMEWIRELESS SENSOR NETWORKSANT COLONY OPTIMIZATIONINTRUSION DETECTIONNEURAL-NETWORKSACCESS-CONTROLROUTING PROTOCOLSENERGY-EFFICIENTPERSON AUTHENTICATIONALGORITHM4604 Cybersecurity and privacy4606 Distributed computing and systems software
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC