Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Edith Cowan University

2023

Optimization

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Oriented Crossover In Genetic Algorithms For Computer Networks Optimization, Furkan Rabee, Zahir M. Hussain May 2023

Oriented Crossover In Genetic Algorithms For Computer Networks Optimization, Furkan Rabee, Zahir M. Hussain

Research outputs 2022 to 2026

Optimization using genetic algorithms (GA) is a well-known strategy in several scientific disciplines. The crossover is an essential operator of the genetic algorithm. It has been an active area of research to develop sustainable forms for this operand. In this work, a new crossover operand is proposed. This operand depends on giving an elicited description for the chromosome with a new structure for alleles of the parents. It is suggested that each allele has two attitudes, one attitude differs contrastingly with the other, and both of them complement the allele. Thus, in case where one attitude is good, the other …


Developing Resilient Cyber-Physical Systems: A Review Of State-Of-The-Art Malware Detection Approaches, Gaps, And Future Directions, M. Imran Malik, Ahmed Ibrahim, Peter Hannay, Leslie F. Sikos Apr 2023

Developing Resilient Cyber-Physical Systems: A Review Of State-Of-The-Art Malware Detection Approaches, Gaps, And Future Directions, M. Imran Malik, Ahmed Ibrahim, Peter Hannay, Leslie F. Sikos

Research outputs 2022 to 2026

Cyber-physical systems (CPSes) are rapidly evolving in critical infrastructure (CI) domains such as smart grid, healthcare, the military, and telecommunication. These systems are continually threatened by malicious software (malware) attacks by adversaries due to their improvised tactics and attack methods. A minor configuration change in a CPS through malware has devastating effects, which the world has seen in Stuxnet, BlackEnergy, Industroyer, and Triton. This paper is a comprehensive review of malware analysis practices currently being used and their limitations and efficacy in securing CPSes. Using well-known real-world incidents, we have covered the significant impacts when a CPS is compromised. In …