Bio-inspired security analysis for IoT scenarios.
Vincenzo ContiAndrea ZiggiottoMauro MigliardiSalvatore VitabilePublished in: Int. J. Embed. Syst. (2020)
Keyphrases
- bio inspired
- security analysis
- swarm intelligence
- smart card
- security requirements
- public key
- artificial neural networks
- encryption scheme
- authentication protocol
- machine learning
- user authentication
- wireless networks
- database
- optimization algorithm
- cloud computing
- image compression
- peer to peer
- information systems
- genetic algorithm
- data mining