Beaver algorithm for network security and optimization: Preliminary report

Aladdin Ayesh*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

4 Citations (Scopus)

Abstract

This paper presents the theoretical account for designing and developing an algorithm for network security inspired by the behavior of Beavers. The algorithm uses the beaver behavioral patterns in constructing dams and water tunnels to create analogous secure tunnels and information lakes. The approach is a user-centric and the paper demonstrates the use of the algorithm in security and route optimization with the assumption that the beaver agent is deployed on a mobile device (e.g. smart mobile phone). An algorithmic approach to design the beaver agent and swarm is followed here. The set of algorithms presented is complemented by critical review outlining the further work needed.

Original languageEnglish
Title of host publicationProceedings 2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009
Pages3657-3662
Number of pages6
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009 - San Antonio, TX, United States
Duration: 11 Oct 200914 Oct 2009

Conference

Conference2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009
Country/TerritoryUnited States
CitySan Antonio, TX
Period11/10/0914/10/09

Fingerprint

Dive into the research topics of 'Beaver algorithm for network security and optimization: Preliminary report'. Together they form a unique fingerprint.

Cite this