Academic literature on the topic 'Cyber Algorithm'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber Algorithm.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyber Algorithm"
Yin, Peng-Yeng, Fred Glover, Manuel Laguna, and Jia-Xian Zhu. "A Complementary Cyber Swarm Algorithm." International Journal of Swarm Intelligence Research 2, no. 2 (2011): 22–41. http://dx.doi.org/10.4018/jsir.2011040102.
Full textLiu, Xin-Rui, Yuan Meng, and Peng Chang. "Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading." Complexity 2021 (January 16, 2021): 1–15. http://dx.doi.org/10.1155/2021/6641030.
Full textChoi, Young Hwan, Ali Sadollah, and Joong Hoon Kim. "Improvement of Cyber-Attack Detection Accuracy from Urban Water Systems Using Extreme Learning Machine." Applied Sciences 10, no. 22 (2020): 8179. http://dx.doi.org/10.3390/app10228179.
Full textYang, Tingting, Hailong Feng, Jian Zhao, Ruilong Deng, Ying Wang, and Zhou Su. "Genetic optimization–based scheduling in maritime cyber physical systems." International Journal of Distributed Sensor Networks 13, no. 7 (2017): 155014771771716. http://dx.doi.org/10.1177/1550147717717163.
Full textN, Valliammal, and Barani Shaju. "Deep learning algorithm based cyber-attack detection in cyber-physical systems-a survey." International Journal of Advanced Technology and Engineering Exploration 5, no. 49 (2018): 489–94. http://dx.doi.org/10.19101/ijatee.2018.547030.
Full textP, Karunakaran. "Deep Learning Approach to DGA Classification for Effective Cyber Security." December 2020 2, no. 4 (2021): 203–13. http://dx.doi.org/10.36548/jucct.2020.4.003.
Full textYin, Peng-Yeng, Po-Yen Chen, Ying-Chieh Wei, and Rong-Fuh Day. "Cyber Firefly Algorithm Based on Adaptive Memory Programming for Global Optimization." Applied Sciences 10, no. 24 (2020): 8961. http://dx.doi.org/10.3390/app10248961.
Full textKozik, Rafał, and Michał Choraś. "Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection." Security and Communication Networks 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/6047053.
Full textDo, ChoXuan, Nguyen Quang Dam, and Nguyen Tung Lam. "Optimization of network traffic anomaly detection using machine learning." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 3 (2021): 2360. http://dx.doi.org/10.11591/ijece.v11i3.pp2360-2370.
Full textMa, Wu Bin, Ming Xing Liu, Su Deng, and Hong Bin Huang. "A Spatial Resource Top-K Query Algorithm in Cyber Physical System." Advanced Materials Research 774-776 (September 2013): 1725–28. http://dx.doi.org/10.4028/www.scientific.net/amr.774-776.1725.
Full textDissertations / Theses on the topic "Cyber Algorithm"
Thames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.
Full textChatterjee, Aakriti. "Development of an RSA Algorithm using Reduced RISC V instruction Set." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1617104502129937.
Full textRoychowdhury, Sayak. "Data-Driven Policies for Manufacturing Systems and Cyber Vulnerability Maintenance." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1493905616531091.
Full textGuymon, Daniel Wade. "Cyber-physical Algorithms for Enhancing Collaboration." Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/31919.
Full textGujrati, Sumeet. "Models and algorithms for cyber-physical systems." Diss., Kansas State University, 2013. http://hdl.handle.net/2097/16922.
Full textFurrer, Frank J., and Georg Püschel. "From Algorithmic Computing to Autonomic Computing." Technische Universität Dresden, 2018. https://tud.qucosa.de/id/qucosa%3A30773.
Full textKem, Oudom. "Modélisation et exploitation des connaissances de l’environnement : une approche multi-agents pour la recherche d’itinéraires multi-objectifs dans des environnements ubiquitaires." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSEM023.
Full textStaub, Nicolas. "Models, algorithms and architectures for cooperative manipulation with aerial and ground robots." Thesis, Toulouse 3, 2018. http://www.theses.fr/2018TOU30169/document.
Full textMarkwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.
Full textRukavina, Ivan. "Cyber-physics intrinsic modelling for smart systems." Thesis, Compiègne, 2021. http://bibliotheque.utc.fr/EXPLOITATION/doc/IFD/2021COMP2581.
Full textBooks on the topic "Cyber Algorithm"
Sheng, Quan Z., and Brij B. Gupta. Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices. Taylor & Francis Group, 2019.
Find full textSheng, Quan Z., and Brij B. Gupta. Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices. Taylor & Francis Group, 2019.
Find full textSheng, Quan Z., and Brij B. Gupta. Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices. Taylor & Francis Group, 2019.
Find full textSheng, Quan Z., and Brij B. Gupta. Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices. Taylor & Francis Group, 2019.
Find full textBook chapters on the topic "Cyber Algorithm"
Hong, Sung-Soo, and Sang-Kil Kim. "Mobile Animation Algorithm for Cyber Museum." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44864-0_61.
Full textNguyen, Viet T., Alla G. Kravets, and Tu Q. H. Duong. "Predicting Research Trend Based on Bibliometric Analysis and Paper Ranking Algorithm." In Cyber-Physical Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67892-0_10.
Full textPolyakov, Vladimir, Dmitriy Buhanov, Maxim Panchenko, Margarita Redkina, and Sergey Chernikov. "Research of the ELA Algorithm for Identifying Editing Fact in Jpeg Images." In Cyber-Physical Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67892-0_21.
Full textChen, Yun, Yunlan Du, and Xiaomei Cao. "Density Peak Clustering Algorithm Based on Differential Privacy Preserving." In Science of Cyber Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34637-9_2.
Full textBaruch, Moran, and Gil David. "Domain Generation Algorithm Detection Using Machine Learning Methods." In Cyber Security: Power and Technology. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75307-2_9.
Full textWang, Jing, Fuqi Song, Aihua Yin, and Hui Chen. "Firefly Algorithm Based on Dynamic Step Change Strategy." In Machine Learning for Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62460-6_31.
Full textCheng, Xianfu, Yanqing Yao, and Ao Liu. "An Improved Privacy-Preserving Stochastic Gradient Descent Algorithm." In Machine Learning for Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62223-7_29.
Full textAlsuwat, Emad, Hatim Alsuwat, Marco Valtorta, and Csilla Farkas. "Cyber Attacks Against the PC Learning Algorithm." In ECML PKDD 2018 Workshops. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-13453-2_13.
Full textPeng, Jiao, and Shu Gong. "Optimization of Collaborative Filtering Algorithm in Movie Recommendation System." In Machine Learning for Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62463-7_2.
Full textLiu, Bo, Jianhou Gan, Jun Wang, and Bin Wen. "Product Consistency Joint Detection Algorithm Based on Deep Learning." In Machine Learning for Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62463-7_28.
Full textConference papers on the topic "Cyber Algorithm"
Fisher, Ashwin, Rusty Baldwin, James T. Graham, and Ronald Riley. "Block-level algorithm classification based on RF side-channel." In Cyber Sensing 2018, edited by Peter Chin and Igor V. Ternovskiy. SPIE, 2018. http://dx.doi.org/10.1117/12.2303847.
Full textRiley, Ronald A., James T. Graham, Ashwin Fisher, Rusty O. Baldwin, and Ryan M. Fuller. "Generalization of algorithm recognition in RF side channels between devices." In Cyber Sensing 2018, edited by Peter Chin and Igor V. Ternovskiy. SPIE, 2018. http://dx.doi.org/10.1117/12.2304468.
Full textDong, Huailin, Mingyuan He, and Ming Qiu. "Optimized Gray-Scale Image Watermarking Algorithm Based on DWT-DCT-SVD and Chaotic Firefly Algorithm." In 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2015. http://dx.doi.org/10.1109/cyberc.2015.15.
Full textChang, Jian, Bin Li, Guowei Zhang, Zhida Liang, and Cong Wang. "The Control Algorithm of 7 DOF Manipulator Based on Hybrid Force and Position Algorithm." In 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2017. http://dx.doi.org/10.1109/cyber.2017.8446183.
Full textChen, Min, XueDong Gao, and HuiFei Li. "An efficient parallel FP-Growth algorithm." In 2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2009. http://dx.doi.org/10.1109/cyberc.2009.5342148.
Full textSun, Zhixin, Yadang Chen, and Zhixin Sun. "An Algorithm Based on Directed Graph." In 2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2010. http://dx.doi.org/10.1109/cyberc.2010.63.
Full textO'Brien, Neil S., Steven J. Johnston, Elizabeth E. Hart, Kamal Djidjeli, and Simon J. Cox. "Exploiting Cloud Computing for Algorithm Development." In 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2011. http://dx.doi.org/10.1109/cyberc.2011.60.
Full textChen, Liang, Zhang Tong, Wen Liu, and Chengmin Gao. "Non-interactive Exponential Homomorphic Encryption Algorithm." In 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2012. http://dx.doi.org/10.1109/cyberc.2012.44.
Full textJones, Keith J., and Yong Wang. "An Optimized Running Window Entropy Algorithm." In 2018 National Cyber Summit (NCS). IEEE, 2018. http://dx.doi.org/10.1109/ncs.2018.00016.
Full textBelaidi, Abderrahmane, and Hadjira Belaidi. "Optimization algorithm of manipulator robot performances." In 2014 IEEE 4th Annual International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2014. http://dx.doi.org/10.1109/cyber.2014.6917459.
Full text