{"id":"https://openalex.org/W3046828867","doi":"https://doi.org/10.1145/3377929.3398119","title":"Applications of swarm intelligence algorithms countering the cyber threats","display_name":"Applications of swarm intelligence algorithms countering the cyber threats","publication_year":2020,"publication_date":"2020-07-08","ids":{"openalex":"https://openalex.org/W3046828867","doi":"https://doi.org/10.1145/3377929.3398119","mag":"3046828867"},"language":"en","primary_location":{"id":"doi:10.1145/3377929.3398119","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3377929.3398119","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044266379","display_name":"Thanh Cong Truong","orcid":"https://orcid.org/0000-0001-6603-392X"},"institutions":[{"id":"https://openalex.org/I142208455","display_name":"VSB - Technical University of Ostrava","ror":"https://ror.org/05x8mcb75","country_code":"CZ","type":"education","lineage":["https://openalex.org/I142208455"]}],"countries":["CZ"],"is_corresponding":true,"raw_author_name":"Thanh Cong Truong","raw_affiliation_strings":["VSB-Technical University of Ostrava, Ostrava, Czech Republic"],"affiliations":[{"raw_affiliation_string":"VSB-Technical University of Ostrava, Ostrava, Czech Republic","institution_ids":["https://openalex.org/I142208455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029307955","display_name":"Tan\u2010Phuoc Huynh","orcid":"https://orcid.org/0000-0002-1370-6665"},"institutions":[{"id":"https://openalex.org/I4210142079","display_name":"Eastern International University","ror":"https://ror.org/03gvjya19","country_code":"VN","type":"education","lineage":["https://openalex.org/I4210142079"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Tan-Phuoc Huynh","raw_affiliation_strings":["Eastern International University (EIU), Binh Duong, Viet Nam"],"affiliations":[{"raw_affiliation_string":"Eastern International University (EIU), Binh Duong, Viet Nam","institution_ids":["https://openalex.org/I4210142079"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090445830","display_name":"Ivan Zelinka","orcid":"https://orcid.org/0000-0002-3858-7340"},"institutions":[{"id":"https://openalex.org/I142208455","display_name":"VSB - Technical University of Ostrava","ror":"https://ror.org/05x8mcb75","country_code":"CZ","type":"education","lineage":["https://openalex.org/I142208455"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Ivan Zelinka","raw_affiliation_strings":["VSB-Technical University of Ostrava, Ostrava, Czech Republic"],"affiliations":[{"raw_affiliation_string":"VSB-Technical University of Ostrava, Ostrava, Czech Republic","institution_ids":["https://openalex.org/I142208455"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044266379"],"corresponding_institution_ids":["https://openalex.org/I142208455"],"apc_list":null,"apc_paid":null,"fwci":0.7577,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.70789993,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1476","last_page":"1485"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11975","display_name":"Evolutionary Algorithms and Applications","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/swarm-intelligence","display_name":"Swarm intelligence","score":0.85927414894104},{"id":"https://openalex.org/keywords/swarm-behaviour","display_name":"Swarm behaviour","score":0.7254864573478699},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.6774806976318359},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6749351024627686},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4929654598236084},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.38347601890563965},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33130353689193726},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2513364553451538},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.2270849645137787},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0750652551651001}],"concepts":[{"id":"https://openalex.org/C119487961","wikidata":"https://www.wikidata.org/wiki/Q863960","display_name":"Swarm intelligence","level":3,"score":0.85927414894104},{"id":"https://openalex.org/C181335050","wikidata":"https://www.wikidata.org/wiki/Q14915018","display_name":"Swarm behaviour","level":2,"score":0.7254864573478699},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.6774806976318359},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6749351024627686},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4929654598236084},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.38347601890563965},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33130353689193726},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2513364553451538},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.2270849645137787},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0750652551651001},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3377929.3398119","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3377929.3398119","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":66,"referenced_works":["https://openalex.org/W802844665","https://openalex.org/W1201837668","https://openalex.org/W1496503345","https://openalex.org/W1586736793","https://openalex.org/W1943584070","https://openalex.org/W1976744965","https://openalex.org/W1976816362","https://openalex.org/W1986668511","https://openalex.org/W2005536871","https://openalex.org/W2038411763","https://openalex.org/W2050699972","https://openalex.org/W2080913999","https://openalex.org/W2109364787","https://openalex.org/W2125011234","https://openalex.org/W2143560894","https://openalex.org/W2191006491","https://openalex.org/W2266096763","https://openalex.org/W2292153043","https://openalex.org/W2341871820","https://openalex.org/W2351189884","https://openalex.org/W2386481161","https://openalex.org/W2402597829","https://openalex.org/W2426296831","https://openalex.org/W2438105941","https://openalex.org/W2518265829","https://openalex.org/W2554060258","https://openalex.org/W2559033216","https://openalex.org/W2559725938","https://openalex.org/W2578394146","https://openalex.org/W2601063296","https://openalex.org/W2737409458","https://openalex.org/W2737711166","https://openalex.org/W2765143157","https://openalex.org/W2768025005","https://openalex.org/W2770321693","https://openalex.org/W2783284780","https://openalex.org/W2789332443","https://openalex.org/W2789525712","https://openalex.org/W2789654058","https://openalex.org/W2792619694","https://openalex.org/W2794786524","https://openalex.org/W2796394805","https://openalex.org/W2798741797","https://openalex.org/W2799581224","https://openalex.org/W2804524866","https://openalex.org/W2811018847","https://openalex.org/W2884111547","https://openalex.org/W2890190333","https://openalex.org/W2899889369","https://openalex.org/W2903452648","https://openalex.org/W2912086151","https://openalex.org/W2912586245","https://openalex.org/W2914703235","https://openalex.org/W2963103847","https://openalex.org/W2965128565","https://openalex.org/W2968128232","https://openalex.org/W2997191565","https://openalex.org/W3005490744","https://openalex.org/W3009152417","https://openalex.org/W3099212712","https://openalex.org/W3120740533","https://openalex.org/W3159058926","https://openalex.org/W4236451920","https://openalex.org/W4239177201","https://openalex.org/W4245784973","https://openalex.org/W4300814420"],"related_works":["https://openalex.org/W4308079021","https://openalex.org/W1527337688","https://openalex.org/W2399799070","https://openalex.org/W2048054807","https://openalex.org/W2746377055","https://openalex.org/W4386001959","https://openalex.org/W2594296178","https://openalex.org/W3089846858","https://openalex.org/W3012322385","https://openalex.org/W4304182880"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"swarm":[3],"intelligence":[4,45],"in":[5,10,15,36,72],"particular,":[6],"and":[7,64,87],"bio-inspired":[8],"computing,":[9],"general,":[11],"have":[12],"successfully":[13],"utilized":[14],"a":[16],"number":[17],"of":[18,39,75],"majors":[19],"from":[20],"science,":[21],"engineering":[22],"to":[23,29],"industry.":[24],"Therefore,":[25],"it":[26],"is":[27],"logical":[28],"investigate":[30],"how":[31],"such":[32],"techniques":[33,46],"might":[34],"contribute":[35],"the":[37,54,73],"field":[38,74],"cybersecurity.":[40],"This":[41],"paper":[42],"covers":[43],"swarm-based":[44,60],"for":[47,85],"enhancing":[48],"cybersecurity":[49,76],"as":[50,52],"well":[51],"replenish":[53],"literature":[55],"with":[56],"fresh":[57],"reviews":[58],"on":[59],"methods.":[61],"Furthermore,":[62],"challenges":[63],"possible":[65],"future":[66],"directions":[67],"when":[68],"applying":[69],"swam-based":[70],"methods":[71],"are":[77],"also":[78],"discussed,":[79],"which":[80],"will":[81],"offer":[82],"useful":[83],"insights":[84],"researchers":[86],"practitioners.":[88]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
