Show simple item record

dc.contributor.authorHassan, Mohamed
dc.contributor.authorVidalis, Stilianos
dc.contributor.authorMylonas, Alexios
dc.date.accessioned2016-12-02T15:47:23Z
dc.date.available2016-12-02T15:47:23Z
dc.date.issued2016-09-05
dc.identifier.citationHassan , M , Vidalis , S & Mylonas , A 2016 , ' When biology meets cyber-security: a review ' , Journal of Information System Security (JISSec) , vol. 12 , no. 3 , pp. 177-199 .
dc.identifier.issn1551-0808
dc.identifier.urihttp://hdl.handle.net/2299/17386
dc.descriptionThis is a pre-copyedited, author produced pdf of an article accepted for publication in Journal of Information Systems Security following peer review. The version of record [Journal of Information Systems Security ( September 2016) 12 (3): 17-199, first published on line on September 5, 2016] is available online at: http://www.jissec.org/Contents/V12/N3/V12N3-Hassan.html Copyright © 2006 by The Information Institute. All rights reserved. No part of the manuscript may be reproduced in any form without written permission of the publisher, except for noncommercial, educational use such as classroom teaching purposes.
dc.description.abstractFrom the observations made on biology and nature, it could be seen that biological living creatures are very efficient in the functions of recognising and eliminating danger around them. Their ability to adapt within the surrounding environment and self-healing capability are remarkable. Computer’s defensive systems have been approached by various biological inspired techniques. However, very few surveys examined the current cyber security status; in which most of them are focused on one or two methods (i.e. Artificial Immune System - AIS and/or Genetic Algorithms approaches). In compiling of the following papers, we have reviewed many of the current research, in which focused on the use of biology as a reference discipline that can provide meaningful insight and innovation in the cyber security domain. We aim to present the research gap in cyber-security domain, more specifically in how to protect against the clever information threats and how a computer defensive system can be adapted within its operation environment.en
dc.format.extent24
dc.format.extent1044086
dc.language.isoeng
dc.relation.ispartofJournal of Information System Security (JISSec)
dc.subjectadaptive systems
dc.subjectcyber security domain
dc.subjectbiological inspired computing
dc.subjectfuzzy logic
dc.subjectintrusions detection systems
dc.titleWhen biology meets cyber-security: a reviewen
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionCentre for Computer Science and Informatics Research
dc.description.statusPeer reviewed
dc.identifier.urlhttp://www.jissec.org/news/volume-12-number-3
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record