Nowadays, Information and Communication Technology (ICT) infrastructures play a crucial role for human beings, providing essential services at astonishing speed. Nevertheless, such a centrality of those infrastructures attracts the interest of ill-motivated actors that target such infrastructures with cyberattacks that are every day more sophisticated and more disruptive. In this alarming context, selecting the optimal set of countermeasures represents a primary need to react against the appearance of potentially dangerous threats effectively. With the motivation to contribute to developing faster and more effective response capabilities against them, the paper at hand introduces a novel cybersecurity reaction methodology based on Artificia...
The next generation of Artificial Intelligence (AI) and Machine Learning (ML) are increasingly incor...
Over the last few years, more and more heuristic decision making techniques have been inspired by na...
This is a pre-copyedited, author produced pdf of an article accepted for publication in Journal of I...
Cyberattacks targeting modern network infrastructures are increasing in number and impact. This grow...
From the observations made on biology and nature, it can be seen that biological living creatures ar...
Abstract. Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been ...
Owing to a growing reliance on information, technology and connectivity, Cyberspace has become the l...
The evolution of computing and computing communication capabili-ties has come with an evolution in s...
The biological immune system is an autonomic system for self-protection, which has evolved over mill...
Distributed Denial of Service (DDoS) attacks pose a threat in constant growth. This paper addresses ...
Artificial Immune Systems (AIS), inspired by the human immune system, are algorithms and mechanisms ...
Purpose – A strong and fast-cycle innovation system has been developed to counter the ongoing threat...
The immune system provides a rich metaphor for computer security: anomaly detection that works in na...
This thesis presents novel multi-layered natural immune system (NIS) inspired algorithms in the doma...
Ph.D.This thesis is a theoretical treatise on a proposed new computer security system, based on a bi...
The next generation of Artificial Intelligence (AI) and Machine Learning (ML) are increasingly incor...
Over the last few years, more and more heuristic decision making techniques have been inspired by na...
This is a pre-copyedited, author produced pdf of an article accepted for publication in Journal of I...
Cyberattacks targeting modern network infrastructures are increasing in number and impact. This grow...
From the observations made on biology and nature, it can be seen that biological living creatures ar...
Abstract. Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been ...
Owing to a growing reliance on information, technology and connectivity, Cyberspace has become the l...
The evolution of computing and computing communication capabili-ties has come with an evolution in s...
The biological immune system is an autonomic system for self-protection, which has evolved over mill...
Distributed Denial of Service (DDoS) attacks pose a threat in constant growth. This paper addresses ...
Artificial Immune Systems (AIS), inspired by the human immune system, are algorithms and mechanisms ...
Purpose – A strong and fast-cycle innovation system has been developed to counter the ongoing threat...
The immune system provides a rich metaphor for computer security: anomaly detection that works in na...
This thesis presents novel multi-layered natural immune system (NIS) inspired algorithms in the doma...
Ph.D.This thesis is a theoretical treatise on a proposed new computer security system, based on a bi...
The next generation of Artificial Intelligence (AI) and Machine Learning (ML) are increasingly incor...
Over the last few years, more and more heuristic decision making techniques have been inspired by na...
This is a pre-copyedited, author produced pdf of an article accepted for publication in Journal of I...