Journal articles on the topic 'Cyber Algorithm'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber Algorithm.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yin, Peng-Yeng, Fred Glover, Manuel Laguna, and Jia-Xian Zhu. "A Complementary Cyber Swarm Algorithm." International Journal of Swarm Intelligence Research 2, no. 2 (April 2011): 22–41. http://dx.doi.org/10.4018/jsir.2011040102.
Full textLiu, Xin-Rui, Yuan Meng, and Peng Chang. "Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading." Complexity 2021 (January 16, 2021): 1–15. http://dx.doi.org/10.1155/2021/6641030.
Full textChoi, Young Hwan, Ali Sadollah, and Joong Hoon Kim. "Improvement of Cyber-Attack Detection Accuracy from Urban Water Systems Using Extreme Learning Machine." Applied Sciences 10, no. 22 (November 18, 2020): 8179. http://dx.doi.org/10.3390/app10228179.
Full textYang, Tingting, Hailong Feng, Jian Zhao, Ruilong Deng, Ying Wang, and Zhou Su. "Genetic optimization–based scheduling in maritime cyber physical systems." International Journal of Distributed Sensor Networks 13, no. 7 (July 2017): 155014771771716. http://dx.doi.org/10.1177/1550147717717163.
Full textN, Valliammal, and Barani Shaju. "Deep learning algorithm based cyber-attack detection in cyber-physical systems-a survey." International Journal of Advanced Technology and Engineering Exploration 5, no. 49 (December 21, 2018): 489–94. http://dx.doi.org/10.19101/ijatee.2018.547030.
Full textP, Karunakaran. "Deep Learning Approach to DGA Classification for Effective Cyber Security." December 2020 2, no. 4 (January 6, 2021): 203–13. http://dx.doi.org/10.36548/jucct.2020.4.003.
Full textYin, Peng-Yeng, Po-Yen Chen, Ying-Chieh Wei, and Rong-Fuh Day. "Cyber Firefly Algorithm Based on Adaptive Memory Programming for Global Optimization." Applied Sciences 10, no. 24 (December 15, 2020): 8961. http://dx.doi.org/10.3390/app10248961.
Full textKozik, Rafał, and Michał Choraś. "Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection." Security and Communication Networks 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/6047053.
Full textDo, ChoXuan, Nguyen Quang Dam, and Nguyen Tung Lam. "Optimization of network traffic anomaly detection using machine learning." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 3 (June 1, 2021): 2360. http://dx.doi.org/10.11591/ijece.v11i3.pp2360-2370.
Full textMa, Wu Bin, Ming Xing Liu, Su Deng, and Hong Bin Huang. "A Spatial Resource Top-K Query Algorithm in Cyber Physical System." Advanced Materials Research 774-776 (September 2013): 1725–28. http://dx.doi.org/10.4028/www.scientific.net/amr.774-776.1725.
Full textJaveed, Danish, Tianhan Gao, and Muhammad Taimoor Khan. "SDN-Enabled Hybrid DL-Driven Framework for the Detection of Emerging Cyber Threats in IoT." Electronics 10, no. 8 (April 12, 2021): 918. http://dx.doi.org/10.3390/electronics10080918.
Full textHan, Mee Lan, Deok Jin Kim, and Huy Kang Kim. "Applying CBR algorithm for cyber infringement profiling system." Journal of the Korea Institute of Information Security and Cryptology 23, no. 6 (December 31, 2013): 1069–86. http://dx.doi.org/10.13089/jkiisc.2013.23.6.1069.
Full textMohammadi, Sara, Hamid Mirvaziri, Mostafa Ghazizadeh-Ahsaee, and Hadis Karimipour. "Cyber intrusion detection by combined feature selection algorithm." Journal of Information Security and Applications 44 (February 2019): 80–88. http://dx.doi.org/10.1016/j.jisa.2018.11.007.
Full textKhudhur, Dhuha Dheyaa, and Muayad Sadik Croock. "Physical cyber-security algorithm for wireless sensor networks." TELKOMNIKA (Telecommunication Computing Electronics and Control) 19, no. 4 (August 1, 2021): 1177. http://dx.doi.org/10.12928/telkomnika.v19i4.18464.
Full textAbdel-Basset, Mohamed, Reda Mohamed, Nazeeruddin Mohammad, Karam Sallam, and Nour Moustafa. "An Adaptive Cuckoo Search-Based Optimization Model for Addressing Cyber-Physical Security Problems." Mathematics 9, no. 10 (May 18, 2021): 1140. http://dx.doi.org/10.3390/math9101140.
Full textJ, Shankar Murthy. "Network Software Vulnerability Identifier using J48 decision tree algorithm." International Journal for Research in Applied Science and Engineering Technology 9, no. 8 (August 31, 2021): 1889–92. http://dx.doi.org/10.22214/ijraset.2021.37685.
Full textLi, Qianmu, Shunmei Meng, Xiaonan Sang, Hanrui Zhang, Shoujin Wang, Ali Kashif Bashir, Keping Yu, and Usman Tariq. "Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing." ACM Transactions on Internet Technology 21, no. 3 (June 9, 2021): 1–33. http://dx.doi.org/10.1145/3408291.
Full textOladimeji, Olasehinde Olayemi, Alese Boniface Kayode, Adetunmbi Adebayo Olusola, and Aladesote Olomi Isaiah. "Evaluation of Selected Stacked Ensemble Models for the Optimal Multi-class Cyber-Attacks Detection." International Journal on Cyber Situational Awareness 5, no. 1 (January 16, 2021): 26–48. http://dx.doi.org/10.22619/ijcsa.2020.100132.
Full textAbdou Hussien, Abou_el_ela. "Cyber Security Crimes, Ethics and a Suggested Algorithm to Overcome Cyber-Physical Systems Problems (CybSec1)." Journal of Information Security 12, no. 01 (2021): 56–78. http://dx.doi.org/10.4236/jis.2021.121003.
Full textKuo, R. J., S. H. Lin, and Zhen-Yao Chen. "Integration of Particle Swarm Optimization and Immune Genetic Algorithm-Based Dynamic Clustering for Customer Clustering." International Journal on Artificial Intelligence Tools 24, no. 05 (October 2015): 1550019. http://dx.doi.org/10.1142/s0218213015500190.
Full textS, Smys, Haoxiang Wang, and Abul Basar. "5G Network Simulation in Smart Cities using Neural Network Algorithm." March 2021 3, no. 1 (March 29, 2021): 43–52. http://dx.doi.org/10.36548/jaicn.2021.1.004.
Full textMeira, Jorge. "Comparative Results with Unsupervised Techniques in Cyber Attack Novelty Detection." Proceedings 2, no. 18 (September 17, 2018): 1191. http://dx.doi.org/10.3390/proceedings2181191.
Full textBalan, Shilpa, Sanchita Gawand, and Priyanka Purushu. "Application of Machine Learning Classification Algorithm to Cybersecurity Awareness." Information Technology and Management Science 21 (December 14, 2018): 45–48. http://dx.doi.org/10.7250/itms-2018-0006.
Full textTsiami, Lydia, and Christos Makropoulos. "Cyber—Physical Attack Detection in Water Distribution Systems with Temporal Graph Convolutional Neural Networks." Water 13, no. 9 (April 29, 2021): 1247. http://dx.doi.org/10.3390/w13091247.
Full textBrentan, Bruno, Pedro Rezende, Daniel Barros, Gustavo Meirelles, Edevar Luvizotto, and Joaquín Izquierdo. "Cyber-Attack Detection in Water Distribution Systems Based on Blind Sources Separation Technique." Water 13, no. 6 (March 14, 2021): 795. http://dx.doi.org/10.3390/w13060795.
Full textYan, He Hua, Jia Fu Wan, and Hui Suo. "Adaptive Resource Management for Cyber-Physical Systems." Applied Mechanics and Materials 157-158 (February 2012): 747–51. http://dx.doi.org/10.4028/www.scientific.net/amm.157-158.747.
Full textLazaro, Caterina, Erdal Oruklu, and Ali Cinar. "Cyber-Physical Platform Development for Multivariable Artificial Pancreas Systems." International Journal of Handheld Computing Research 6, no. 3 (July 2015): 1–16. http://dx.doi.org/10.4018/ijhcr.2015070101.
Full textZhou, Wei, Qian Mu Li, and Hong Zhang. "A Method to Solving a Kind of Nonlinear Cyber-Security Equations." Applied Mechanics and Materials 121-126 (October 2011): 627–31. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.627.
Full textLiu, Jia, Mingchu Li, William C. Tang, and Sardar M. N. Islam. "A Cyber Physical System Crowdsourcing Inference Method Based on Tempering: An Advancement in Artificial Intelligence Algorithms." Wireless Communications and Mobile Computing 2021 (February 19, 2021): 1–11. http://dx.doi.org/10.1155/2021/6618980.
Full textSingh, Khundrakpam Johnson, and Tanmay De. "Efficient Classification of DDoS Attacks Using an Ensemble Feature Selection Algorithm." Journal of Intelligent Systems 29, no. 1 (December 1, 2017): 71–83. http://dx.doi.org/10.1515/jisys-2017-0472.
Full textUmar, Sani, and Muhamad Felemban. "Rule-Based Detection of False Data Injections Attacks against Optimal Power Flow in Power Systems." Sensors 21, no. 7 (April 2, 2021): 2478. http://dx.doi.org/10.3390/s21072478.
Full textD., Kushnir, and Paramud Y. "THE INTELIGENE ALGORITHM OF CYBER–PHYSICAL SYSTEM TARGETING ON A MOVABLE OBJECT USING THE SMART SENSOR UNIT." Computer systems and network 2, no. 1 (March 23, 2017): 44–52. http://dx.doi.org/10.23939/csn2020.01.044.
Full textKuc, Mateusz, Wojciech Sułek, and Dariusz Kania. "FPGA-Oriented LDPC Decoder for Cyber-Physical Systems." Mathematics 8, no. 5 (May 4, 2020): 723. http://dx.doi.org/10.3390/math8050723.
Full textKolosok, Irina, and Liudmila Gurina. "Cyber Security-Oriented Smart Grid State Estimation." E3S Web of Conferences 69 (2018): 02004. http://dx.doi.org/10.1051/e3sconf/20186902004.
Full textDo, Taehoon, Seungwoo Park, Jaehwan Lee, and Sangoh Park. "M-folding method–based elliptic curve cryptosystem for industrial cyber-physical system." International Journal of Distributed Sensor Networks 15, no. 10 (October 2019): 155014771987904. http://dx.doi.org/10.1177/1550147719879045.
Full textAlhudhaif, Adi, Maryam Yammahi, Tong Yan, and Simon Berkovich. "A Cyber-Physical Stream Algorithm for Intelligent Software Defined Storage." International Journal of Computer Applications 109, no. 5 (January 16, 2015): 21–25. http://dx.doi.org/10.5120/19185-0672.
Full textDayanika, J., G. Archana, K. Siva Kumar, and N. Pavani. "Early Detection of Cyber Attacks Based on Feature Selection Algorithm." Journal of Computational and Theoretical Nanoscience 17, no. 9 (July 1, 2020): 4648–53. http://dx.doi.org/10.1166/jctn.2020.9293.
Full textIwendi, Celestine, Zunera Jalil, Abdul Rehman Javed, Thippa Reddy G., Rajesh Kaluri, Gautam Srivastava, and Ohyun Jo. "KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks." IEEE Access 8 (2020): 72650–60. http://dx.doi.org/10.1109/access.2020.2988160.
Full textLi, Shancang, Shanshan Zhao, Po Yang, Panagiotis Andriotis, Lida Xu, and Qindong Sun. "Distributed Consensus Algorithm for Events Detection in Cyber-Physical Systems." IEEE Internet of Things Journal 6, no. 2 (April 2019): 2299–308. http://dx.doi.org/10.1109/jiot.2019.2906157.
Full textPrice, Benjamin, Michael Zhivich, Michael Thompson, and Chris Eagle. "House Rules: Designing the Scoring Algorithm for Cyber Grand Challenge." IEEE Security & Privacy 16, no. 2 (March 2018): 23–31. http://dx.doi.org/10.1109/msp.2018.1870877.
Full textHu, Zhaohua, and JiaJing Huang. "Re-detection object tracking algorithm in the cyber physical system." IET Cyber-Physical Systems: Theory & Applications 5, no. 3 (September 1, 2020): 253–62. http://dx.doi.org/10.1049/iet-cps.2019.0086.
Full textPark, Sanghyuk, Jai-Hoon Kim, and Geoffrey Fox. "Effective real-time scheduling algorithm for cyber physical systems society." Future Generation Computer Systems 32 (March 2014): 253–59. http://dx.doi.org/10.1016/j.future.2013.10.003.
Full textKuo, Shu-Yu, Yao-Hsin Chou, and Chi-Yuan Chen. "Quantum-inspired algorithm for cyber-physical visual surveillance deployment systems." Computer Networks 117 (April 2017): 5–18. http://dx.doi.org/10.1016/j.comnet.2016.11.013.
Full textStrohschein, Jan, Andreas Fischbach, Andreas Bunte, Heide Faeskorn-Woyke, Natalia Moriz, and Thomas Bartz-Beielstein. "Cognitive capabilities for the CAAI in cyber-physical production systems." International Journal of Advanced Manufacturing Technology 115, no. 11-12 (June 8, 2021): 3513–32. http://dx.doi.org/10.1007/s00170-021-07248-3.
Full textKushnir, Dmytro, and Yaroslav Paramud. "The Algorithm of Cyber-physical System Targeting on a Movable Object Using the Smart Sensor Unit." Advances in Cyber-Physical Systems 5, no. 1 (November 28, 2017): 16–22. http://dx.doi.org/10.23939/acps2020.01.016.
Full textTang, Hong Tao. "Strategy for Test Paper Composition Based on Genetic Algorithm." Applied Mechanics and Materials 513-517 (February 2014): 1688–91. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1688.
Full textFernando, Chandima, Carrick Detweiler, and Justin Bradley. "Co-Regulated Consensus of Cyber-Physical Resources in Multi-Agent Unmanned Aircraft Systems." Electronics 8, no. 5 (May 23, 2019): 569. http://dx.doi.org/10.3390/electronics8050569.
Full textCao, Yuanlong, Ruiwen Ji, Lejun Ji, Mengshuang Bao, Lei Tao, and Wei Yang. "Can Multipath TCP Be Robust to Cyber Attacks? A Measuring Study of MPTCP with Active Queue Management Algorithms." Security and Communication Networks 2021 (May 27, 2021): 1–11. http://dx.doi.org/10.1155/2021/9963829.
Full textBihl, Trevor J., Todd J. Paciencia, Kenneth W. Bauer, and Michael A. Temple. "Cyber-Physical Security with RF Fingerprint Classification through Distance Measure Extensions of Generalized Relevance Learning Vector Quantization." Security and Communication Networks 2020 (February 24, 2020): 1–12. http://dx.doi.org/10.1155/2020/3909763.
Full textNaeem Yasir, Muntadher, and Muayad Sadik Croock. "Multi-level cyber security system for VANET." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 2 (August 1, 2020): 940. http://dx.doi.org/10.11591/ijeecs.v19.i2.pp940-948.
Full text