Survey on evolutionary computation methods for cybersecurity of mobile ad hoc networks.
Janusz KusykM. Ümit UyarCem Safak SahinPublished in: Evol. Intell. (2018)
Keyphrases
- evolutionary computation
- evolutionary algorithm
- machine learning and data mining
- genetic programming
- computational intelligence
- evolutionary approaches
- mobile ad hoc networks
- swarm intelligence
- nature inspired algorithms
- genetic algorithm
- data mining techniques
- real time
- neural network
- decision making
- fuzzy logic
- continuous domains