Journal articles on the topic 'Cyber Algorithm'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber Algorithm.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yin, Peng-Yeng, Fred Glover, Manuel Laguna, and Jia-Xian Zhu. "A Complementary Cyber Swarm Algorithm." International Journal of Swarm Intelligence Research 2, no. 2 (2011): 22–41. http://dx.doi.org/10.4018/jsir.2011040102.
Full textLiu, Xin-Rui, Yuan Meng, and Peng Chang. "Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading." Complexity 2021 (January 16, 2021): 1–15. http://dx.doi.org/10.1155/2021/6641030.
Full textChoi, Young Hwan, Ali Sadollah, and Joong Hoon Kim. "Improvement of Cyber-Attack Detection Accuracy from Urban Water Systems Using Extreme Learning Machine." Applied Sciences 10, no. 22 (2020): 8179. http://dx.doi.org/10.3390/app10228179.
Full textYang, Tingting, Hailong Feng, Jian Zhao, Ruilong Deng, Ying Wang, and Zhou Su. "Genetic optimization–based scheduling in maritime cyber physical systems." International Journal of Distributed Sensor Networks 13, no. 7 (2017): 155014771771716. http://dx.doi.org/10.1177/1550147717717163.
Full textN, Valliammal, and Barani Shaju. "Deep learning algorithm based cyber-attack detection in cyber-physical systems-a survey." International Journal of Advanced Technology and Engineering Exploration 5, no. 49 (2018): 489–94. http://dx.doi.org/10.19101/ijatee.2018.547030.
Full textP, Karunakaran. "Deep Learning Approach to DGA Classification for Effective Cyber Security." December 2020 2, no. 4 (2021): 203–13. http://dx.doi.org/10.36548/jucct.2020.4.003.
Full textYin, Peng-Yeng, Po-Yen Chen, Ying-Chieh Wei, and Rong-Fuh Day. "Cyber Firefly Algorithm Based on Adaptive Memory Programming for Global Optimization." Applied Sciences 10, no. 24 (2020): 8961. http://dx.doi.org/10.3390/app10248961.
Full textKozik, Rafał, and Michał Choraś. "Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection." Security and Communication Networks 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/6047053.
Full textDo, ChoXuan, Nguyen Quang Dam, and Nguyen Tung Lam. "Optimization of network traffic anomaly detection using machine learning." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 3 (2021): 2360. http://dx.doi.org/10.11591/ijece.v11i3.pp2360-2370.
Full textMa, Wu Bin, Ming Xing Liu, Su Deng, and Hong Bin Huang. "A Spatial Resource Top-K Query Algorithm in Cyber Physical System." Advanced Materials Research 774-776 (September 2013): 1725–28. http://dx.doi.org/10.4028/www.scientific.net/amr.774-776.1725.
Full textJaveed, Danish, Tianhan Gao, and Muhammad Taimoor Khan. "SDN-Enabled Hybrid DL-Driven Framework for the Detection of Emerging Cyber Threats in IoT." Electronics 10, no. 8 (2021): 918. http://dx.doi.org/10.3390/electronics10080918.
Full textHan, Mee Lan, Deok Jin Kim, and Huy Kang Kim. "Applying CBR algorithm for cyber infringement profiling system." Journal of the Korea Institute of Information Security and Cryptology 23, no. 6 (2013): 1069–86. http://dx.doi.org/10.13089/jkiisc.2013.23.6.1069.
Full textMohammadi, Sara, Hamid Mirvaziri, Mostafa Ghazizadeh-Ahsaee, and Hadis Karimipour. "Cyber intrusion detection by combined feature selection algorithm." Journal of Information Security and Applications 44 (February 2019): 80–88. http://dx.doi.org/10.1016/j.jisa.2018.11.007.
Full textKhudhur, Dhuha Dheyaa, and Muayad Sadik Croock. "Physical cyber-security algorithm for wireless sensor networks." TELKOMNIKA (Telecommunication Computing Electronics and Control) 19, no. 4 (2021): 1177. http://dx.doi.org/10.12928/telkomnika.v19i4.18464.
Full textAbdel-Basset, Mohamed, Reda Mohamed, Nazeeruddin Mohammad, Karam Sallam, and Nour Moustafa. "An Adaptive Cuckoo Search-Based Optimization Model for Addressing Cyber-Physical Security Problems." Mathematics 9, no. 10 (2021): 1140. http://dx.doi.org/10.3390/math9101140.
Full textJ, Shankar Murthy. "Network Software Vulnerability Identifier using J48 decision tree algorithm." International Journal for Research in Applied Science and Engineering Technology 9, no. 8 (2021): 1889–92. http://dx.doi.org/10.22214/ijraset.2021.37685.
Full textLi, Qianmu, Shunmei Meng, Xiaonan Sang, et al. "Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing." ACM Transactions on Internet Technology 21, no. 3 (2021): 1–33. http://dx.doi.org/10.1145/3408291.
Full textOladimeji, Olasehinde Olayemi, Alese Boniface Kayode, Adetunmbi Adebayo Olusola, and Aladesote Olomi Isaiah. "Evaluation of Selected Stacked Ensemble Models for the Optimal Multi-class Cyber-Attacks Detection." International Journal on Cyber Situational Awareness 5, no. 1 (2021): 26–48. http://dx.doi.org/10.22619/ijcsa.2020.100132.
Full textAbdou Hussien, Abou_el_ela. "Cyber Security Crimes, Ethics and a Suggested Algorithm to Overcome Cyber-Physical Systems Problems (CybSec1)." Journal of Information Security 12, no. 01 (2021): 56–78. http://dx.doi.org/10.4236/jis.2021.121003.
Full textKuo, R. J., S. H. Lin, and Zhen-Yao Chen. "Integration of Particle Swarm Optimization and Immune Genetic Algorithm-Based Dynamic Clustering for Customer Clustering." International Journal on Artificial Intelligence Tools 24, no. 05 (2015): 1550019. http://dx.doi.org/10.1142/s0218213015500190.
Full textS, Smys, Haoxiang Wang, and Abul Basar. "5G Network Simulation in Smart Cities using Neural Network Algorithm." March 2021 3, no. 1 (2021): 43–52. http://dx.doi.org/10.36548/jaicn.2021.1.004.
Full textMeira, Jorge. "Comparative Results with Unsupervised Techniques in Cyber Attack Novelty Detection." Proceedings 2, no. 18 (2018): 1191. http://dx.doi.org/10.3390/proceedings2181191.
Full textBalan, Shilpa, Sanchita Gawand, and Priyanka Purushu. "Application of Machine Learning Classification Algorithm to Cybersecurity Awareness." Information Technology and Management Science 21 (December 14, 2018): 45–48. http://dx.doi.org/10.7250/itms-2018-0006.
Full textTsiami, Lydia, and Christos Makropoulos. "Cyber—Physical Attack Detection in Water Distribution Systems with Temporal Graph Convolutional Neural Networks." Water 13, no. 9 (2021): 1247. http://dx.doi.org/10.3390/w13091247.
Full textBrentan, Bruno, Pedro Rezende, Daniel Barros, Gustavo Meirelles, Edevar Luvizotto, and Joaquín Izquierdo. "Cyber-Attack Detection in Water Distribution Systems Based on Blind Sources Separation Technique." Water 13, no. 6 (2021): 795. http://dx.doi.org/10.3390/w13060795.
Full textYan, He Hua, Jia Fu Wan, and Hui Suo. "Adaptive Resource Management for Cyber-Physical Systems." Applied Mechanics and Materials 157-158 (February 2012): 747–51. http://dx.doi.org/10.4028/www.scientific.net/amm.157-158.747.
Full textLazaro, Caterina, Erdal Oruklu, and Ali Cinar. "Cyber-Physical Platform Development for Multivariable Artificial Pancreas Systems." International Journal of Handheld Computing Research 6, no. 3 (2015): 1–16. http://dx.doi.org/10.4018/ijhcr.2015070101.
Full textZhou, Wei, Qian Mu Li, and Hong Zhang. "A Method to Solving a Kind of Nonlinear Cyber-Security Equations." Applied Mechanics and Materials 121-126 (October 2011): 627–31. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.627.
Full textLiu, Jia, Mingchu Li, William C. Tang, and Sardar M. N. Islam. "A Cyber Physical System Crowdsourcing Inference Method Based on Tempering: An Advancement in Artificial Intelligence Algorithms." Wireless Communications and Mobile Computing 2021 (February 19, 2021): 1–11. http://dx.doi.org/10.1155/2021/6618980.
Full textSingh, Khundrakpam Johnson, and Tanmay De. "Efficient Classification of DDoS Attacks Using an Ensemble Feature Selection Algorithm." Journal of Intelligent Systems 29, no. 1 (2017): 71–83. http://dx.doi.org/10.1515/jisys-2017-0472.
Full textUmar, Sani, and Muhamad Felemban. "Rule-Based Detection of False Data Injections Attacks against Optimal Power Flow in Power Systems." Sensors 21, no. 7 (2021): 2478. http://dx.doi.org/10.3390/s21072478.
Full textD., Kushnir, and Paramud Y. "THE INTELIGENE ALGORITHM OF CYBER–PHYSICAL SYSTEM TARGETING ON A MOVABLE OBJECT USING THE SMART SENSOR UNIT." Computer systems and network 2, no. 1 (2017): 44–52. http://dx.doi.org/10.23939/csn2020.01.044.
Full textKuc, Mateusz, Wojciech Sułek, and Dariusz Kania. "FPGA-Oriented LDPC Decoder for Cyber-Physical Systems." Mathematics 8, no. 5 (2020): 723. http://dx.doi.org/10.3390/math8050723.
Full textKolosok, Irina, and Liudmila Gurina. "Cyber Security-Oriented Smart Grid State Estimation." E3S Web of Conferences 69 (2018): 02004. http://dx.doi.org/10.1051/e3sconf/20186902004.
Full textDo, Taehoon, Seungwoo Park, Jaehwan Lee, and Sangoh Park. "M-folding method–based elliptic curve cryptosystem for industrial cyber-physical system." International Journal of Distributed Sensor Networks 15, no. 10 (2019): 155014771987904. http://dx.doi.org/10.1177/1550147719879045.
Full textAlhudhaif, Adi, Maryam Yammahi, Tong Yan, and Simon Berkovich. "A Cyber-Physical Stream Algorithm for Intelligent Software Defined Storage." International Journal of Computer Applications 109, no. 5 (2015): 21–25. http://dx.doi.org/10.5120/19185-0672.
Full textDayanika, J., G. Archana, K. Siva Kumar, and N. Pavani. "Early Detection of Cyber Attacks Based on Feature Selection Algorithm." Journal of Computational and Theoretical Nanoscience 17, no. 9 (2020): 4648–53. http://dx.doi.org/10.1166/jctn.2020.9293.
Full textIwendi, Celestine, Zunera Jalil, Abdul Rehman Javed, et al. "KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks." IEEE Access 8 (2020): 72650–60. http://dx.doi.org/10.1109/access.2020.2988160.
Full textLi, Shancang, Shanshan Zhao, Po Yang, Panagiotis Andriotis, Lida Xu, and Qindong Sun. "Distributed Consensus Algorithm for Events Detection in Cyber-Physical Systems." IEEE Internet of Things Journal 6, no. 2 (2019): 2299–308. http://dx.doi.org/10.1109/jiot.2019.2906157.
Full textPrice, Benjamin, Michael Zhivich, Michael Thompson, and Chris Eagle. "House Rules: Designing the Scoring Algorithm for Cyber Grand Challenge." IEEE Security & Privacy 16, no. 2 (2018): 23–31. http://dx.doi.org/10.1109/msp.2018.1870877.
Full textHu, Zhaohua, and JiaJing Huang. "Re-detection object tracking algorithm in the cyber physical system." IET Cyber-Physical Systems: Theory & Applications 5, no. 3 (2020): 253–62. http://dx.doi.org/10.1049/iet-cps.2019.0086.
Full textPark, Sanghyuk, Jai-Hoon Kim, and Geoffrey Fox. "Effective real-time scheduling algorithm for cyber physical systems society." Future Generation Computer Systems 32 (March 2014): 253–59. http://dx.doi.org/10.1016/j.future.2013.10.003.
Full textKuo, Shu-Yu, Yao-Hsin Chou, and Chi-Yuan Chen. "Quantum-inspired algorithm for cyber-physical visual surveillance deployment systems." Computer Networks 117 (April 2017): 5–18. http://dx.doi.org/10.1016/j.comnet.2016.11.013.
Full textStrohschein, Jan, Andreas Fischbach, Andreas Bunte, Heide Faeskorn-Woyke, Natalia Moriz, and Thomas Bartz-Beielstein. "Cognitive capabilities for the CAAI in cyber-physical production systems." International Journal of Advanced Manufacturing Technology 115, no. 11-12 (2021): 3513–32. http://dx.doi.org/10.1007/s00170-021-07248-3.
Full textKushnir, Dmytro, and Yaroslav Paramud. "The Algorithm of Cyber-physical System Targeting on a Movable Object Using the Smart Sensor Unit." Advances in Cyber-Physical Systems 5, no. 1 (2017): 16–22. http://dx.doi.org/10.23939/acps2020.01.016.
Full textTang, Hong Tao. "Strategy for Test Paper Composition Based on Genetic Algorithm." Applied Mechanics and Materials 513-517 (February 2014): 1688–91. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1688.
Full textFernando, Chandima, Carrick Detweiler, and Justin Bradley. "Co-Regulated Consensus of Cyber-Physical Resources in Multi-Agent Unmanned Aircraft Systems." Electronics 8, no. 5 (2019): 569. http://dx.doi.org/10.3390/electronics8050569.
Full textCao, Yuanlong, Ruiwen Ji, Lejun Ji, Mengshuang Bao, Lei Tao, and Wei Yang. "Can Multipath TCP Be Robust to Cyber Attacks? A Measuring Study of MPTCP with Active Queue Management Algorithms." Security and Communication Networks 2021 (May 27, 2021): 1–11. http://dx.doi.org/10.1155/2021/9963829.
Full textBihl, Trevor J., Todd J. Paciencia, Kenneth W. Bauer, and Michael A. Temple. "Cyber-Physical Security with RF Fingerprint Classification through Distance Measure Extensions of Generalized Relevance Learning Vector Quantization." Security and Communication Networks 2020 (February 24, 2020): 1–12. http://dx.doi.org/10.1155/2020/3909763.
Full textNaeem Yasir, Muntadher, and Muayad Sadik Croock. "Multi-level cyber security system for VANET." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 2 (2020): 940. http://dx.doi.org/10.11591/ijeecs.v19.i2.pp940-948.
Full text