2021
DOI: 10.1007/978-3-030-72236-4_18
|View full text |Cite
|
Sign up to set email alerts
|

Metaheuristic Techniques in Attack and Defense Strategies for Cybersecurity: A Systematic Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 47 publications
0
2
0
Order By: Relevance
“…Furthermore, in the context of information security systems, [24] puts forth multi-criteria cost optimization method, employing the vector-evaluated genetic algorithm. Researchers in [25], driven by the escalating interaction in cyberspace, have devised optimization techniques for both attack and defense. These optimization approaches leverage artificial intelligence techniques powered by metaheuristics to identify and detect threats and attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, in the context of information security systems, [24] puts forth multi-criteria cost optimization method, employing the vector-evaluated genetic algorithm. Researchers in [25], driven by the escalating interaction in cyberspace, have devised optimization techniques for both attack and defense. These optimization approaches leverage artificial intelligence techniques powered by metaheuristics to identify and detect threats and attacks.…”
Section: Related Workmentioning
confidence: 99%
“…A significant portion of the optimization in threat identification is due to the reduction of features during the training stage. Metaheuristics are important in decreasing these characteristics [15,16]. The use of intelligent algorithms in the development of cyber security models to detect various sorts of assaults is researched to improve performance.…”
mentioning
confidence: 99%