ORCID Profile
0000-0001-9998-4019
Current Organisation
Central Queensland University Brisbane Campus
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
Publisher: Elsevier BV
Date: 07-2016
Publisher: Springer Science and Business Media LLC
Date: 14-11-2017
Publisher: Springer Science and Business Media LLC
Date: 10-01-2023
Publisher: Elsevier BV
Date: 12-2019
Publisher: IEEE
Date: 09-2011
Publisher: IEEE
Date: 12-2014
Publisher: Springer Science and Business Media LLC
Date: 09-03-2016
Publisher: Elsevier BV
Date: 2015
Publisher: Penerbit UTM Press
Date: 20-06-2014
DOI: 10.11113/JT.V69.3150
Abstract: Protecting information assets is very vital to the core survival of an organization. By increasing in cyber-attacks and viruses worldwide, it has become essential for organizations to adopt innovative and rigorous procedures to keep these vital assets out of the reach of exploiters. Although worldwide complying with an international information security standard such as ISO 27001 has been raised, with over 7000 registered certificates, few Iranian companies are under ISO 27001 certified. Also organization needs to perform a risk assessment in order to determine the organization's asset exposure to risk and determine the best way to manage this. The determination of risk within the methodology is based upon the standard formula, which the risk is calculated from the multiplication of the asset value, threats and vulnerability. The ISO 27001 requires is that 'An appropriate risk assessment shall be undertaken'. One of the main factors for risk assessment is identifying and scoring of Information asset in this process. Due to different values of asset in organizations, the main purpose of this study is to identify and investigate a weighted method to assign different values of assets in order to minimize vulnerability in manufacturing systems. This study also aims at improving asset value scoring by using heuristic methods. A real world case study was selected for implementation of this approach based on ISO27001` in Iran.
Publisher: Springer Science and Business Media LLC
Date: 28-02-2017
Publisher: Elsevier BV
Date: 2019
Publisher: Elsevier BV
Date: 2014
Publisher: IEEE
Date: 12-2019
Publisher: IEEE
Date: 11-2016
Publisher: Elsevier BV
Date: 2015
Publisher: MDPI AG
Date: 20-12-2018
DOI: 10.3390/APP9010007
Abstract: Firefly algorithm is among the nature-inspired optimization algorithms. The standard firefly algorithm has been successfully applied to many engineering problems. However, this algorithm might be stuck in stagnation (the solutions do not enhance anymore) or possibly fall in premature convergence (fall in to the local optimum) in searching space. It seems that both issues could be connected to the exploitation and exploration. Excessive exploitation leads to premature convergence, while excessive exploration slows down the convergence. In this study, the classical firefly algorithm is modified such that make a balance between exploitation and exploration. The purposed modified algorithm ranks and sorts the initial solutions. Next, the operators named insertion, swap and reversion are utilized to search the neighbourhood of solutions in the second group, in which all these operators are chosen randomly. After that, the acquired solutions combined with the first group and the firefly algorithm finds the new potential solutions. A multi-echelon supply chain network problem is chosen to investigate the decisions associated with the distribution of multiple products that are delivered through multiple distribution centres and retailers to end customers and demonstrate the efficiency of the proposed algorithm.
Publisher: Springer International Publishing
Date: 2014
Publisher: Informa UK Limited
Date: 10-06-2023
No related grants have been discovered for Ashkan Memari.