Loading [MathJax]/extensions/MathMenu.js
Beaver algorithm for network security and optimization: Preliminary report | IEEE Conference Publication | IEEE Xplore

Beaver algorithm for network security and optimization: Preliminary report


Abstract:

This paper presents the theoretical account for designing and developing an algorithm for network security inspired by the behavior of Beavers. The algorithm uses the bea...Show More

Abstract:

This paper presents the theoretical account for designing and developing an algorithm for network security inspired by the behavior of Beavers. The algorithm uses the beaver behavioral patterns in constructing dams and water tunnels to create analogous secure tunnels and information lakes. The approach is a user-centric and the paper demonstrates the use of the algorithm in security and route optimization with the assumption that the beaver agent is deployed on a mobile device (e.g. smart mobile phone). An algorithmic approach to design the beaver agent and swarm is followed here. The set of algorithms presented is complemented by critical review outlining the further work needed.
Date of Conference: 11-14 October 2009
Date Added to IEEE Xplore: 04 December 2009
ISBN Information:
Print ISSN: 1062-922X
Conference Location: San Antonio, TX, USA

Contact IEEE to Subscribe

References

References is not available for this document.