Bio-inspired Security Scheme for IoT Technology
نویسندگان
چکیده
منابع مشابه
Bio-inspired computing for hybrid information technology
Recently biologically inspired, converged and hybrid information technologies have become of significant interest due to their capabilities in handling many real world complex problems, involving imprecision, uncertainty and vagueness and highdimensionality. This special issue is committed to capture the state-of-the-art and recent advances on various aspects of biologically inspired computing ...
متن کاملBio-Inspired Scheme for Classification of Visual Information
In this chapter, research on visual information classification based on biologically inspired visually selective attention with knowledge structuring is presented. The research objective is to develop visual models and corresponding algorithms to automatically extract features from selective essential areas of natural images, and finally, to achieve knowledge structuring and classification with...
متن کاملBio-inspired mechanisms for efficient and adaptive network security
In recent years, many efforts have been made in developing algorithms and methodologies for building efficient network security mechanisms. The primary requirements are efficiency, adaptability, and scalability. Network security mechanisms are composed of several components. First, high-performance network monitoring entities are required allowing the analysis of transmitted data even in high-s...
متن کاملA Bio-Inspired Concept for Information Security Modelling
Bio-inspired models for information security were designed to demonstrate the performances by which biology achieves security. Existing research focuses on borrowing partial ideas from biological systems to resolve some facet of information security in a network environment, such as intrusion detection and fault tolerance. This work uses the bio-inspired concept of the body system to demonstrat...
متن کاملBio-inspired mechanisms for efficient and adaptive network security mechanisms
In recent years, many efforts have been made in developing algorithms and methodologies for building efficient network security mechanisms. The primary requirements are efficiency, adaptability, and scalability. Network security mechanisms are composed of several components. First, high-performance network monitoring entities are required allowing the analysis of transmitted data even in high-s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2019
ISSN: 0975-8887
DOI: 10.5120/ijca2019918960