This research is focused on using a highly detailed simulation model to create a physical security system to prevent intrusions in a building. Security consists of guards and security cameras. The problem is represented as a binary optimization problem. A new heuristic is proposed to do the security configuration optimization, the Hybrid Genetic Ant Optimization (HGAO). This heuristic combines a genetic algorithm (GA) and an ant colony optimization (ACO). HGAO is compared with GA for two security optimization scenarios
Trabalho completo: acesso restrito, p. 282–292In this paper we describe a multiagent crime simulatio...
Security of the information in the computer networks has been one of the most important research are...
We meet with solving of optimization problems every day, when we try to do our tasks in the best way...
This research is focused on using a highly detailed simulation model to create a physical security s...
Industrial control systems (ICS) are facing an increasing number of sophisticated and damaging multi...
Protection against many cyber security threats can be implemented by existing software on the system...
This paper presents an optimization framework, based on Genetic Algorithms, for the control of the '...
Today, information systems are threatened not only by the opportunistic exploitation of particular t...
This paper presents an optimization framework, based on Genetic Algorithms, for the control of the “...
This paper describes two algorithms for optimizing the design of distributed perimeter security syst...
The realization of security wired network is very critical when the network itself must be installed...
AbstractThe main aim of this paper is to find the appropriate set of Genetic Algorithm (GA), control...
International audienceThis paper proposes a hybrid algorithm which allows us to optimize maintenance...
Hardening the dynamic networks is a very challenging task due to their complexity and dynamicity. Mo...
AbstractEffective optimization of unconstrained building optimization problem involves coupling a bu...
Trabalho completo: acesso restrito, p. 282–292In this paper we describe a multiagent crime simulatio...
Security of the information in the computer networks has been one of the most important research are...
We meet with solving of optimization problems every day, when we try to do our tasks in the best way...
This research is focused on using a highly detailed simulation model to create a physical security s...
Industrial control systems (ICS) are facing an increasing number of sophisticated and damaging multi...
Protection against many cyber security threats can be implemented by existing software on the system...
This paper presents an optimization framework, based on Genetic Algorithms, for the control of the '...
Today, information systems are threatened not only by the opportunistic exploitation of particular t...
This paper presents an optimization framework, based on Genetic Algorithms, for the control of the “...
This paper describes two algorithms for optimizing the design of distributed perimeter security syst...
The realization of security wired network is very critical when the network itself must be installed...
AbstractThe main aim of this paper is to find the appropriate set of Genetic Algorithm (GA), control...
International audienceThis paper proposes a hybrid algorithm which allows us to optimize maintenance...
Hardening the dynamic networks is a very challenging task due to their complexity and dynamicity. Mo...
AbstractEffective optimization of unconstrained building optimization problem involves coupling a bu...
Trabalho completo: acesso restrito, p. 282–292In this paper we describe a multiagent crime simulatio...
Security of the information in the computer networks has been one of the most important research are...
We meet with solving of optimization problems every day, when we try to do our tasks in the best way...