Author:
Ayub Muhammad Yaseen,Mehdi Mohammad Ammar,Tawaseem Syeda Ghanwa,Zukhraf Syeda Zillay Nain,Zupash
Publisher
Springer International Publishing
Reference30 articles.
1. D. Schatz, R. Bashroush, J. Wall, Towards a more representative definition of cyber security. J. Digit. Forensics, Secur. Law 12(2), 8 (2017)
2. A. Kott, Towards fundamental science of cyber security, in Network Science and Cybersecurity (Springer, New York, NY, 2014), pp. 1–13
3. C.D. McDermott, A. Petrovski, Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks. Int. J. Comput. Netw. Commun. 9(4) (2017)
4. M.G. Ball, B. Qela, S. Wesolkowski, A review of the use of computational intelligence in the design of military surveillance networks. Recent Adv. Comput. Intell. Def. Secur. 663–693 (2016)
5. M.Z. Gunduz, R. Das, Cyber-security on the smart grid: threats and potential solutions. Comput. Netw. 169, 107094 (2020)