Research Article
Design of Intrusion Detection and Prevention in SCADA System for the Detection of Bias Injection Attacks
Table 1
Crossover mutation model.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
H[t] denotes the current position; I[t] denotes the best personal experience; R[t] indicates the best global position among all wolves; N[t] indicates the offspring 1; L[t] denotes offspring 2; and S[t] indicates offspring 3. After mutation, the location of the current hunt agent is renewed. A and D are the coefficient vectors for linearly decreasing iterations. |