Open Access Open Access  Restricted Access Subscription Access

Survey:Biological Inspired Computing in the Network Security


Affiliations
1 Department of CSE, CBIT, Proddatur, Y.S.R (dist), A.P-516360, India
 

Traditional computing techniques and systems consider a main process device or main server, and technique details generally serially. They're non-robust and non-adaptive, and have limited quantity. Indifference, scientific technique details in a very similar and allocated manner, while not a main management. They're exceedingly strong, elastic, and ascendible. This paper offers a short conclusion of however the ideas from biology are will never to style new processing techniques and techniques that even have a number of the beneficial qualities of scientific techniques. Additionally, some illustrations are a device given of however these techniques will be used in details security programs.

Keywords

Bio-Inspired, Computing, Network Security, Robust, Adapitive.
User
Notifications
Font Size

Abstract Views: 239

PDF Views: 2




  • Survey:Biological Inspired Computing in the Network Security

Abstract Views: 239  |  PDF Views: 2

Authors

V. Venkata Ramana
Department of CSE, CBIT, Proddatur, Y.S.R (dist), A.P-516360, India
Y. Subba Reddy
Department of CSE, CBIT, Proddatur, Y.S.R (dist), A.P-516360, India
G. Rama Subba Reddy
Department of CSE, CBIT, Proddatur, Y.S.R (dist), A.P-516360, India
Pandurangan Ravi
Department of CSE, CBIT, Proddatur, Y.S.R (dist), A.P-516360, India

Abstract


Traditional computing techniques and systems consider a main process device or main server, and technique details generally serially. They're non-robust and non-adaptive, and have limited quantity. Indifference, scientific technique details in a very similar and allocated manner, while not a main management. They're exceedingly strong, elastic, and ascendible. This paper offers a short conclusion of however the ideas from biology are will never to style new processing techniques and techniques that even have a number of the beneficial qualities of scientific techniques. Additionally, some illustrations are a device given of however these techniques will be used in details security programs.

Keywords


Bio-Inspired, Computing, Network Security, Robust, Adapitive.