Research Article

The Framework for Simulation of Bioinspired Security Mechanisms against Network Infrastructure Attacks

Algorithm 3

if    SEARCH
then DELETE  
    return 1
else  GETENCMSG  
if  
then if SEARCHC
    then  
if  
    then INSERTDB  
       return 0
INSERTDB