Beaver algorithm for network security and optimization: Preliminary report

Aladdin Ayesh*

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

    3 Citations (Scopus)

    Abstract

    This paper presents the theoretical account for designing and developing an algorithm for network security inspired by the behavior of Beavers. The algorithm uses the beaver behavioral patterns in constructing dams and water tunnels to create analogous secure tunnels and information lakes. The approach is a user-centric and the paper demonstrates the use of the algorithm in security and route optimization with the assumption that the beaver agent is deployed on a mobile device (e.g. smart mobile phone). An algorithmic approach to design the beaver agent and swarm is followed here. The set of algorithms presented is complemented by critical review outlining the further work needed.

    Original languageEnglish
    Title of host publicationProceedings 2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009
    Pages3657-3662
    Number of pages6
    DOIs
    Publication statusPublished - 2009
    Event2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009 - San Antonio, TX, United States
    Duration: 11 Oct 200914 Oct 2009

    Conference

    Conference2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009
    Country/TerritoryUnited States
    CitySan Antonio, TX
    Period11/10/0914/10/09

    Fingerprint

    Dive into the research topics of 'Beaver algorithm for network security and optimization: Preliminary report'. Together they form a unique fingerprint.

    Cite this