dc.contributor.author | Hassan, Mohamed | |
dc.contributor.author | Vidalis, Stilianos | |
dc.contributor.author | Mylonas, Alexios | |
dc.date.accessioned | 2016-12-02T15:47:23Z | |
dc.date.available | 2016-12-02T15:47:23Z | |
dc.date.issued | 2016-09-05 | |
dc.identifier.citation | Hassan , M , Vidalis , S & Mylonas , A 2016 , ' When biology meets cyber-security: a review ' , Journal of Information System Security (JISSec) , vol. 12 , no. 3 , pp. 177-199 . | |
dc.identifier.issn | 1551-0808 | |
dc.identifier.uri | http://hdl.handle.net/2299/17386 | |
dc.description | This is a pre-copyedited, author produced pdf of an article accepted for publication in Journal of Information Systems Security following peer review. The version of record [Journal of Information Systems Security ( September 2016) 12 (3): 17-199, first published on line on September 5, 2016] is available online at: http://www.jissec.org/Contents/V12/N3/V12N3-Hassan.html Copyright © 2006 by The Information Institute. All rights reserved. No part of the manuscript may be reproduced in any form without written permission of the publisher, except for noncommercial, educational use such as classroom teaching purposes. | |
dc.description.abstract | From the observations made on biology and nature, it could be seen that biological living creatures are very efficient in the functions of recognising and eliminating danger around them. Their ability to adapt within the surrounding environment and self-healing capability are remarkable. Computer’s defensive systems have been approached by various biological inspired techniques. However, very few surveys examined the current cyber security status; in which most of them are focused on one or two methods (i.e. Artificial Immune System - AIS and/or Genetic Algorithms approaches). In compiling of the following papers, we have reviewed many of the current research, in which focused on the use of biology as a reference discipline that can provide meaningful insight and innovation in the cyber security domain. We aim to present the research gap in cyber-security domain, more specifically in how to protect against the clever information threats and how a computer defensive system can be adapted within its operation environment. | en |
dc.format.extent | 24 | |
dc.format.extent | 1044086 | |
dc.language.iso | eng | |
dc.relation.ispartof | Journal of Information System Security (JISSec) | |
dc.subject | adaptive systems | |
dc.subject | cyber security domain | |
dc.subject | biological inspired computing | |
dc.subject | fuzzy logic | |
dc.subject | intrusions detection systems | |
dc.title | When biology meets cyber-security: a review | en |
dc.contributor.institution | School of Computer Science | |
dc.contributor.institution | Centre for Computer Science and Informatics Research | |
dc.description.status | Peer reviewed | |
dc.identifier.url | http://www.jissec.org/news/volume-12-number-3 | |
rioxxterms.type | Journal Article/Review | |
herts.preservation.rarelyaccessed | true | |