Applications and evaluations of bio-inspired approaches in cloud security: A review
Version 2 2024-06-04, 04:49Version 2 2024-06-04, 04:49
Version 1 2020-01-01, 00:00Version 1 2020-01-01, 00:00
journal contribution
posted on 2024-06-04, 04:49 authored by MM Ahsan, KD Gupta, AK Nag, S Poudyal, Abbas KouzaniAbbas Kouzani, MAP MahmudApplications and evaluations of bio-inspired approaches in cloud security: A review
History
Related Materials
- 1.
Location
Piscataway, N.J.Open access
- Yes
Link to full text
Language
EnglishPublication classification
C1 Refereed article in a scholarly journalJournal
IEEE AccessVolume
8Pagination
180799-180814ISSN
2169-3536eISSN
2169-3536Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCUsage metrics
Categories
No categories selectedKeywords
Science & TechnologyTechnologyComputer Science, Information SystemsEngineering, Electrical & ElectronicTelecommunicationsComputer ScienceEngineeringHeuristic algorithmsCloud computing securityImmune systemAuthenticationEvolutionary computationCloud computingcybersecurityevolutionary algorithmswarm intelligenceneural networkPASSWORD AUTHENTICATION SCHEMEWIRELESS SENSOR NETWORKSANT COLONY OPTIMIZATIONINTRUSION DETECTIONNEURAL-NETWORKSACCESS-CONTROLROUTING PROTOCOLSENERGY-EFFICIENTPERSON AUTHENTICATIONALGORITHM4604 Cybersecurity and privacy4606 Distributed computing and systems software
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC

