SlideShare a Scribd company logo
1 of 40
Jan , 2016
www.iiec2016.com
Mostafa Hajiaghaei-Keshteli
Amir Mohammad Fathollahi Fard
Social Engineering Optimization
(SEO)
University of Science & Technology of Mazandaran, Behshahr, Iran
February 2017
Content
 Meta-heuristics
 Social Engineering
 Social Engineering Optimization (SEO)
 Benchmark functions
 Engineering problems
 Conclusion
 Questions
2
Content
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Evolutionary Algorithms
 Optimization techniques can be divided into
two groups, mathematical programming and
Meta-heuristic algorithms (Gandomi, 2014).
 In general, the existing Meta-heuristic
algorithms are divided into two main
categories as follows:
1) Single-solution
2) Population-based (Zheng, 2015).
3
Meta-heuristics
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Evolutionary Algorithms
4
Meta-heuristics
Metaheuristics
Population-based
metaheuristics
Single-solution
metaheuristics
Scatter Search (SS)
Genetic Algorithm (GA)
Red Deer Algorithm (RDA)
Ant Colony Optimization (ACO)
Particle Swarm Optimization (PSO)
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Evolutionary Algorithms
5
Meta-heuristics
Metaheuristics
Population-based
metaheuristics
Single-solution
metaheuristics
Tabu search (TS)
Variable neighborhood search (VNS)
Social Engineering Optimization (SEO)
Simulated annealing (SA)
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
‌‫‌های‬‫م‬‫یت‬‫ر‬‫الگو‬‌‫ی‬‫فراابتکار‬
No. Year Algorithm
1 1975 Holland introduced the Genetic Algorithm (GA).
2 1977 Glover proposed Scatter Search (SS).
3 1980 Smith elucidated genetic programming.
4 1983 Kirkpatrick et al. proposed Simulated Annealing (SA).
5 1986 Glover and McMillan offeredTabuSearch(TS).
6 1986 Farmer et al. suggested the Artificial immune system (AIS).
7 1988 Koza registered his first patent on genetic programming.
8 1989 Moscato presented Memetic Algorithm.
9 1992 Dorigo proposed the Ant Colony Algorithm (ACO).
10 1993 Fonseca and Fleming provided Multi-Objective GA (MOGA).
11 1994 Battiti and Tecchiolli introduced Reactive Search Optimization (RSO).
12 1995 Kennedy and Eberhart proposed Particle Swarm Optimization (PSO).
13 1997 Storn and Price suggested Differential Evolution (DE).
14 1997 Rubinstein presented the Cross Entropy Method (CEM).
15 2001 Geemetal.providedHarmonySearch(HS).
16 2001 Hanseth and Aanestad offered Bootstrap Algorithm (BA).
17 2004 Nakrani and Tovey presented Bees Optimization (BO).
18 2005 Krishnanand and Ghose introduced Glowworm Swarm Optimization(GSO).
19 2005 Karaboga proposed Artificial Bee Colony Algorithm (ABC).
20 2006 Haddad et al. suggested Honey-bee Mating Optimization (HMO).
21 2007 Hamed Shah-Hosseini offered Intelligent Water Drops (IWD).
Meta-heuristics
6
‌‫‌های‬‫م‬‫یت‬‫ر‬‫الگو‬‌‫ی‬‫فراابتکار‬
22 2007 Atashpaz-Gargari and Lucas introduced Imperialist CompetitiveAlgorithm (ICA).
23 2008 Yang presented Firefly Algorithm (FA).
24 2008 Mucherino and Seref suggested Monkey Search (MS).
25 2009 Husseinzadeh- Kashan provided League Championship Algorithm (LCA).
26 2009 Rashedi et al. introduced Gravitational Search Algorithm (GSA).
27 2009 Yang and Deb offered Cuckoo Search (CS).
28 2010 Yang developed Bat Algorithm (BA).
29 2011 Shah-Hosseini introduced the Galaxy-based Search Algorithm (GbSA).
30 2011 Tamura and Yasuda designed Spiral Optimization (SO).
31 2011 Rajabioun developed Cuckoo Optimization Algorithm (COA)
32 2011 Rao et al. presented Teaching-Learning-Based Optimization (TLBO) algorithm.
33 2012 Gandomi and Alavi proposed the Krill Herd (KH) Algorithm.
34 2012 Çivicioglu introduced Differential Search Algorithm (DSA).
35 2012 Hajiaghaei-Keshteli and Aminnayeri proposed the Keshtel Algorithm (KA).
36 2013 Husseinzadeh- Kashan provided Optics Inspired Optimization(OIO).
37 2013 Husseinzadeh- Kashan proposed Grouping Evolution Strategies (GES).
38 2014 Gandomi presented Interior Search Algorithm (ISA).
39 2014 Salimi proposed Stochastic Factal Search (SFS).
40 2015 Zheng developed Water Wave Optimization (WWO).
41 2016 Fathollahi Fard and Hajiaghaei-Keshteli proposed Red Deer Algorithm (RDA).
42 2017
Fathollahi Fard and Hajiaghaei-Keshteli presented Social Engineering Optimization
(SEO).
Meta-heuristics
7
‌‫‌های‬‫م‬‫یت‬‫ر‬‫الگو‬‌‫ی‬‫فراابتکار‬
Iran
Other
Summary
Other 0.65
Iran 0.35
Meta-heuristics
8A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Evolutionary Algorithms
 Social Engineering (SE) is defined as indirect
attacks to obtain the people and reveal their
information by using certain techniques
(Granger, 2002).
 Sarah Granger acknowledged that defense
against the Social Engineering attacks has a
common pattern such as a mass. In addition,
she claimed that the Social Engineering attack
procedure has a four step cycle.
9
Social Engineering
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
 The phases of Social Engineering are as
follows:
1) Training and Retraining
2) Spotting an attack
3) Responding to attack
4) Selecting a new way or choosing some one
else
A. M. Fathollahi Fard Social Engineering Optimization (SEO) 10
Social Engineering
Scottish Red Deer
 In the first phase, the training and retraining
from attacker to defender is considered. In this
regard, the attacker wants to obtain some
special information from defender.
 This information can be put in different
contents. Perhaps, the first questions are about
famous special clip video, music, sport and
public events that occur in the community and
other dimension of personal family systems.
11
Training and Retraining
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Red Deer’s Characteristics
 It is obvious that before carrying out an attack,
on the point where the probability of success is
more than other points, it must be identified.
 The attacker takes you (defender) to a position
that he/she prefers the defender to be placed in
the way of his/her goals.
 The most important thing to prevent an attack
on his/her main demand is that defender can
understand and think like an attacker.
12
Spotting an attack
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Red Deer’s Roaring
 The next phase is how to respond this SE
attack and react of defender and how much
information it wishes to make striker. In SE
attacks, the most important phase is how to
respond to an attack.
 The pervious experiences and his/her
knowledge about this kind of attack may be
helped him/her.
13
Responding to an attack
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Red Deer’s Mating
 At the least, in final step, the attacker try to
steal each thing that is may be useful and strike
to defender. Or if an attack is not achieved
satisfactory results or otherwise offensive
repeats or stopped by person and someone else
chooses.
14
Selecting a new way or choosing
some one else
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Red Deer Algorithm (RDA)
 In this algorithm each solution is counterpart
to a person and traits of each person such as
his/her ability in contents of mathematical,
sport, business and so on are the counterpart of
all variables of each solution in search space.
15
SEO
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
16A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Start
Initialize the attacker and the defender
Train and retrain
Spot an attack
Respond to attack
Is the number of
attacks ended?
Select a new person as defender
Stopping
condition
End
A. M. Fathollahi Fard Social Engineering Optimization (SEO) 17
Start
Initialize the attacker and the defender
Train and retrain
Spot an attack
Respond to attack
Is the number of
attacks ended?
Select a new person as defender
Stopping
condition
End
LS
A. M. Fathollahi Fard Social Engineering Optimization (SEO) 18
Start
Initialize the attacker and the defender
Train and retrain
Spot an attack
Respond to attack
Is the number of
attacks ended?
Select a new person as defender
Stopping
condition
End
Int.
A. M. Fathollahi Fard Social Engineering Optimization (SEO) 19
Start
Initialize the attacker and the defender
Train and retrain
Spot an attack
Respond to attack
Is the number of
attacks ended?
Select a new person as defender
Stopping
condition
End
Div.
Red Deer Algorithm (RDA)
1. Initialize the attacker and the defender
20
SEO
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Red Deer Algorithm (RDA)
2. Train and retrain
21
SEO
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Red Deer Algorithm (RDA)
3. Spot an attack
 Obtaining
 Phishing
 Diversion theft
 Pretext
22
SEO
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Red Deer Algorithm (RDA)
23
Obtaining
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Red Deer Algorithm (RDA)
24
Phishing
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Red Deer Algorithm (RDA)
25
Diversion theft
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Red Deer Algorithm (RDA)
26
Pretext
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Experiments
27
SEO
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
4. Respond to attack
New position of the defender is evaluated and
compared with the old position of the
defender.
Experiments
28
SEO
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
5. Select a new person as the defender
Here, the attacker annihilates the defender and
selects a new person randomly to perform SE
rules.
6. Stopping condition
Like other meta-heuristics, the stop condition
may be maximum time of the simulation or
the quality of the best solution ever found or
other selected condition by user.
Experiments
29
SEO
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Conclusion
 In this part, six famous benchmark functions
which have been used in pervious researches
are utilized.
 These problems are numbered as P1 to P6 and
all of them are minimization problems. In all
standard functions, the optimum value is equal
to zero. Each of them has certain
characteristics.
 The details on these functions are show in
Table 1.
30
Benchmark functions
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Conclusion
31
Benchmark function
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Conclusion
32
Benchmark function
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Conclusion
33
Benchmark function
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Conclusion
34
Benchmark function
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
The results show the superiority of SEO and its behavior to find the
optimal solution. Four versions of SEO are presented in this study
based on four proposed techniques. All of them are reached optimal
solutions and the second technique is most successful in among other
four techniques. In addition, it seems user can choice suitable
technique by considering the type and dimension of the problems.
Conclusion
35
Engineering problem
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
In this part, we consider a single machine
scheduling problem. Single-machine
scheduling or single-resource scheduling is the
process of assigning a group of tasks to a single
machine or resource.
Conclusion
36
Engineering problem
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
Conclusion
37
Engineering problem
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
To compare the proposed algorithms, we utilized three
powerful methods. GA, ICA and RDA are used in this
study. In order, the problems are sorted as well. We define
6 different sizes of problems and assign equal time
-0.01
0.01
0.03
0.05
0.07
0.09
0.11
50 100 150 200 250 300
GA
ICA
RDA
SEO_1
SEO_2
SEO_3
SEO_4
Conclusion
38
Conclusion
A. M. Fathollahi Fard Social Engineering Optimization (SEO)
 In this work, a new optimization algorithm, inspired by
Social Engineering is developed.
This algorithm is so simple and intelligent. Besides, it
makes a balance between the phases by creative
methods.
The result of experiments shows the performance and
efficiency of proposed method.
For future studies, more comprehensive analyses on the
SEO may still required to be explored.
Moreover, we can employ some other real techniques in
SE attacks to develop the proposed SEO.
References
 [1] E. Atashpaz-Gargari, C. Lucas, “Imperialist competitive algorithm: an algorithm for optimization inspired by imperialistic competition.” in: IEEE Congress on Evolutionary
Computation, Singapore (2007), 4661–4667.
 [2] A. Ebrahimi, E. Khamehchi, “Sperm Whale Algorithm: an Effective Metaheuristic Algorithm for Production Optimization Problems.” Journal of Natural Gas Science &
Engineering, 29, (2016), 211-222.
 [3] A. M. Fathollahi Fard, M. Hajiaghaei-Keshteli, “Red Deer Algorithm (RDA); A New Optimization Algorithm Inspired by Red Deers’ Mating.” 12th International Conference
on Industrial Engineering (ICIE 2016), Tehran, Iran, (2016), 34-35.
 [4] M. Feldman, D. Biskup, “Single machine scheduling for minimizing earliness and tardiness penalties by meta-heuristic approaches.” Computers & Industrial Engineering, 44,
(2003), 307–323.
 [5] S. Granger, “Social Engineering Fundamentals, Part I: Hacker Tactics.” Security Focus, December 18, (2001).
 [6] S. Granger, “Social Engineering Fundamentals, Part II: Combat Strategies.” Security Focus, January 9, (2002).
 [7] M. Hajiaghaei-Keshteli, “The allocation of customers to potential distribution centers in supply chain network; GA and AIA approaches.” Appl. Soft Comput.11, (2011),
2069–2078.
 [8] M. Hajiaghaei-Keshteli, M. Aminnayeri, “Keshtel Algorithm (KA); a new optimization algorithm inspired by Keshtels’ feeding.” Proceeding in IEEE Conference on
Industrial Engineering and Management Systems (2013), 2249–2253.
 [9] M. Hajiaghaei-Keshteli, M. Aminnayeri, “Solving the integrated scheduling of production rail transportation problem by Keshtel algorithm.” Applied Soft Computing, 25,
(2014), 184–203.
 [10] M. Hajiaghaei-Keshteli, S. Molla-Alizadeh-Zavardehi, R. Tavakkoli-Moghaddam, “Addressing a nonlinear fixed-charge transportation problem using a spanning tree-based
genetic algorithm.” Computers and Industrial Engineering, 59, (2010), 259–271.
 [11] J. H. Holland, Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence, University of
Michigan Press, Michigan, Ann Arbor, (1975).
 [12] J. A. Hoogeveen, S. L. van de Velde, “Scheduling around small common due date.” European Journal of Operational Research, 55, (1991), 237-242.
 [13] R. J. W. James, “Using tabu search to solve the common due date early-tardy machine scheduling problem.” Computers and Operation Research, 24, (1997), 199-208.
 [14] D. Karaboga, B. Akay, “A comparative study of Artificial Bee Colony algorithm.” Applied Mathematics and Computation, 214, (2009), 108–132.
 [15] J. Kennedy, R. Eberhart, “Particle swarm optimization.” Proc. IEEE Int. Conf. Neural Networks. Perth, Australia, (1995), 1942-1945.
 [16] S. Kirkpatrick, C. D. Gelatto, M. P. Vecchi, “Optimization by simulated annealing.” Science, 220, (1983), 671-680.
 [17] C. Y. Lee, S. J. Kim, “Parallel genetic algorithms for the earliness–tardiness job scheduling problem with general penalty weights.” Computers & Industrial Engineering, 28,
(1995), 231–243.
 [18] X. R. Luo, R. Brody, A. Seazzu, S. Burd, “Social Engineering: The Neglected Human Factor for.” Managing Information Resources and Technology: Emerging
Applications and Theories, (2013), 151.
 [19] S. Mirjalili, “SCA: A Sine Cosine Algorithm for Solving Optimization Problems.” Knowledge-Based Systems, 96, (2016), 120-133.
 [20] S. Mirjalili, A. Lewis, “The Whale Optimization Algorithm.” Advances in Engineering Software, 95, (2016), 51-67.
 [21] S. Nazeri-Shirkouhi, H. Eivazy, R. Ghodsi, K. Rezaie, E. Atashpaz-Gargari, “Solving the integrated product mix outsourcing problem using the Imperialist Competitive
Algorithm.” Expert Systems with Applications, 37, (2010), 7615–7626.
 [22] A. M. Weinberg, “Can technology replace social engineering?” Bulletin of the Atomic Scientist, 22, (10), (1966), 4-8.
 [23] X.S. Yang, “Nature-inspired Metaheurisitc Algorithm.” Luniver Press, (2008).
 [24] Yu-Jun Zheng, “Water Wave Optimization: A new nature-inspired metaheuristic.” Computers & Operations Research, 55, (2015), 1–11.
39
References
Thank You for Your Attention
Any Question?

More Related Content

Similar to Social Engineering Optimization (SEO)

000 Welcome to Unit IV discussion about environmental scree.docx
000 Welcome to Unit IV discussion about environmental scree.docx000 Welcome to Unit IV discussion about environmental scree.docx
000 Welcome to Unit IV discussion about environmental scree.docxhoney725342
 
Dynamic Role Engine and Formation Control for Cooperating Agents with Robust ...
Dynamic Role Engine and Formation Control for Cooperating Agents with Robust ...Dynamic Role Engine and Formation Control for Cooperating Agents with Robust ...
Dynamic Role Engine and Formation Control for Cooperating Agents with Robust ...Waqas Tariq
 
Keynote: Politics, Business and Machine Learning (Josh Simons)
Keynote: Politics, Business and Machine Learning (Josh Simons)Keynote: Politics, Business and Machine Learning (Josh Simons)
Keynote: Politics, Business and Machine Learning (Josh Simons)Digital Workplace Experience
 
Excelsior College Business External Environment Report.docx
Excelsior College Business External Environment Report.docxExcelsior College Business External Environment Report.docx
Excelsior College Business External Environment Report.docxbkbk37
 
M Porter Presentation Draft
M  Porter  Presentation  DraftM  Porter  Presentation  Draft
M Porter Presentation DraftBarry Thierno
 
Rp mr course quiz 05
Rp mr course quiz 05Rp mr course quiz 05
Rp mr course quiz 05MROC Japan
 
Generative Adversarial Networks - (Introduction)
Generative Adversarial Networks  - (Introduction)Generative Adversarial Networks  - (Introduction)
Generative Adversarial Networks - (Introduction)khalooei
 
0 raj ngo ppt seminar.pdfx
0 raj ngo ppt seminar.pdfx0 raj ngo ppt seminar.pdfx
0 raj ngo ppt seminar.pdfxSALMAN SHAIKH
 
10122018Week 5 Required Reading and Supplementary Materials - .docx
10122018Week 5 Required Reading and Supplementary Materials - .docx10122018Week 5 Required Reading and Supplementary Materials - .docx
10122018Week 5 Required Reading and Supplementary Materials - .docxtamicawaysmith
 
Development teams: an untapped source of innovation that you must unlock!
Development teams: an untapped source of innovation that you must unlock!Development teams: an untapped source of innovation that you must unlock!
Development teams: an untapped source of innovation that you must unlock!MassTLC
 
An advanced interview guide for online marketing professionals
An advanced interview guide for online marketing professionalsAn advanced interview guide for online marketing professionals
An advanced interview guide for online marketing professionalsSocial Bubble
 
Algorithmic Bias - What is it? Why should we care? What can we do about it?
Algorithmic Bias - What is it? Why should we care? What can we do about it? Algorithmic Bias - What is it? Why should we care? What can we do about it?
Algorithmic Bias - What is it? Why should we care? What can we do about it? University of Minnesota, Duluth
 
ASE Keynote 2022: From Automation to Empowering Software Developers
ASE Keynote 2022: From Automation to Empowering Software Developers ASE Keynote 2022: From Automation to Empowering Software Developers
ASE Keynote 2022: From Automation to Empowering Software Developers Margaret-Anne Storey
 
Powerboost2010 crispincandexp
Powerboost2010 crispincandexpPowerboost2010 crispincandexp
Powerboost2010 crispincandexpCareerXroads
 
Powerboost2010-Crispin-Candidate Experience
Powerboost2010-Crispin-Candidate ExperiencePowerboost2010-Crispin-Candidate Experience
Powerboost2010-Crispin-Candidate ExperienceCareerXroads
 
LB discussion replies.docx
LB discussion replies.docxLB discussion replies.docx
LB discussion replies.docxwrite5
 

Similar to Social Engineering Optimization (SEO) (20)

000 Welcome to Unit IV discussion about environmental scree.docx
000 Welcome to Unit IV discussion about environmental scree.docx000 Welcome to Unit IV discussion about environmental scree.docx
000 Welcome to Unit IV discussion about environmental scree.docx
 
Dynamic Role Engine and Formation Control for Cooperating Agents with Robust ...
Dynamic Role Engine and Formation Control for Cooperating Agents with Robust ...Dynamic Role Engine and Formation Control for Cooperating Agents with Robust ...
Dynamic Role Engine and Formation Control for Cooperating Agents with Robust ...
 
Keynote: Politics, Business and Machine Learning (Josh Simons)
Keynote: Politics, Business and Machine Learning (Josh Simons)Keynote: Politics, Business and Machine Learning (Josh Simons)
Keynote: Politics, Business and Machine Learning (Josh Simons)
 
Excelsior College Business External Environment Report.docx
Excelsior College Business External Environment Report.docxExcelsior College Business External Environment Report.docx
Excelsior College Business External Environment Report.docx
 
M Porter Presentation Draft
M  Porter  Presentation  DraftM  Porter  Presentation  Draft
M Porter Presentation Draft
 
Rp mr course quiz 05
Rp mr course quiz 05Rp mr course quiz 05
Rp mr course quiz 05
 
Generative Adversarial Networks - (Introduction)
Generative Adversarial Networks  - (Introduction)Generative Adversarial Networks  - (Introduction)
Generative Adversarial Networks - (Introduction)
 
C0441216
C0441216C0441216
C0441216
 
0 raj ngo ppt seminar.pdfx
0 raj ngo ppt seminar.pdfx0 raj ngo ppt seminar.pdfx
0 raj ngo ppt seminar.pdfx
 
10122018Week 5 Required Reading and Supplementary Materials - .docx
10122018Week 5 Required Reading and Supplementary Materials - .docx10122018Week 5 Required Reading and Supplementary Materials - .docx
10122018Week 5 Required Reading and Supplementary Materials - .docx
 
Hr
HrHr
Hr
 
Expert system project
Expert system projectExpert system project
Expert system project
 
set
setset
set
 
Development teams: an untapped source of innovation that you must unlock!
Development teams: an untapped source of innovation that you must unlock!Development teams: an untapped source of innovation that you must unlock!
Development teams: an untapped source of innovation that you must unlock!
 
An advanced interview guide for online marketing professionals
An advanced interview guide for online marketing professionalsAn advanced interview guide for online marketing professionals
An advanced interview guide for online marketing professionals
 
Algorithmic Bias - What is it? Why should we care? What can we do about it?
Algorithmic Bias - What is it? Why should we care? What can we do about it? Algorithmic Bias - What is it? Why should we care? What can we do about it?
Algorithmic Bias - What is it? Why should we care? What can we do about it?
 
ASE Keynote 2022: From Automation to Empowering Software Developers
ASE Keynote 2022: From Automation to Empowering Software Developers ASE Keynote 2022: From Automation to Empowering Software Developers
ASE Keynote 2022: From Automation to Empowering Software Developers
 
Powerboost2010 crispincandexp
Powerboost2010 crispincandexpPowerboost2010 crispincandexp
Powerboost2010 crispincandexp
 
Powerboost2010-Crispin-Candidate Experience
Powerboost2010-Crispin-Candidate ExperiencePowerboost2010-Crispin-Candidate Experience
Powerboost2010-Crispin-Candidate Experience
 
LB discussion replies.docx
LB discussion replies.docxLB discussion replies.docx
LB discussion replies.docx
 

Recently uploaded

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Social Engineering Optimization (SEO)

  • 1. Jan , 2016 www.iiec2016.com Mostafa Hajiaghaei-Keshteli Amir Mohammad Fathollahi Fard Social Engineering Optimization (SEO) University of Science & Technology of Mazandaran, Behshahr, Iran February 2017
  • 2. Content  Meta-heuristics  Social Engineering  Social Engineering Optimization (SEO)  Benchmark functions  Engineering problems  Conclusion  Questions 2 Content A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 3. Evolutionary Algorithms  Optimization techniques can be divided into two groups, mathematical programming and Meta-heuristic algorithms (Gandomi, 2014).  In general, the existing Meta-heuristic algorithms are divided into two main categories as follows: 1) Single-solution 2) Population-based (Zheng, 2015). 3 Meta-heuristics A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 4. Evolutionary Algorithms 4 Meta-heuristics Metaheuristics Population-based metaheuristics Single-solution metaheuristics Scatter Search (SS) Genetic Algorithm (GA) Red Deer Algorithm (RDA) Ant Colony Optimization (ACO) Particle Swarm Optimization (PSO) A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 5. Evolutionary Algorithms 5 Meta-heuristics Metaheuristics Population-based metaheuristics Single-solution metaheuristics Tabu search (TS) Variable neighborhood search (VNS) Social Engineering Optimization (SEO) Simulated annealing (SA) A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 6. ‌‫‌های‬‫م‬‫یت‬‫ر‬‫الگو‬‌‫ی‬‫فراابتکار‬ No. Year Algorithm 1 1975 Holland introduced the Genetic Algorithm (GA). 2 1977 Glover proposed Scatter Search (SS). 3 1980 Smith elucidated genetic programming. 4 1983 Kirkpatrick et al. proposed Simulated Annealing (SA). 5 1986 Glover and McMillan offeredTabuSearch(TS). 6 1986 Farmer et al. suggested the Artificial immune system (AIS). 7 1988 Koza registered his first patent on genetic programming. 8 1989 Moscato presented Memetic Algorithm. 9 1992 Dorigo proposed the Ant Colony Algorithm (ACO). 10 1993 Fonseca and Fleming provided Multi-Objective GA (MOGA). 11 1994 Battiti and Tecchiolli introduced Reactive Search Optimization (RSO). 12 1995 Kennedy and Eberhart proposed Particle Swarm Optimization (PSO). 13 1997 Storn and Price suggested Differential Evolution (DE). 14 1997 Rubinstein presented the Cross Entropy Method (CEM). 15 2001 Geemetal.providedHarmonySearch(HS). 16 2001 Hanseth and Aanestad offered Bootstrap Algorithm (BA). 17 2004 Nakrani and Tovey presented Bees Optimization (BO). 18 2005 Krishnanand and Ghose introduced Glowworm Swarm Optimization(GSO). 19 2005 Karaboga proposed Artificial Bee Colony Algorithm (ABC). 20 2006 Haddad et al. suggested Honey-bee Mating Optimization (HMO). 21 2007 Hamed Shah-Hosseini offered Intelligent Water Drops (IWD). Meta-heuristics 6
  • 7. ‌‫‌های‬‫م‬‫یت‬‫ر‬‫الگو‬‌‫ی‬‫فراابتکار‬ 22 2007 Atashpaz-Gargari and Lucas introduced Imperialist CompetitiveAlgorithm (ICA). 23 2008 Yang presented Firefly Algorithm (FA). 24 2008 Mucherino and Seref suggested Monkey Search (MS). 25 2009 Husseinzadeh- Kashan provided League Championship Algorithm (LCA). 26 2009 Rashedi et al. introduced Gravitational Search Algorithm (GSA). 27 2009 Yang and Deb offered Cuckoo Search (CS). 28 2010 Yang developed Bat Algorithm (BA). 29 2011 Shah-Hosseini introduced the Galaxy-based Search Algorithm (GbSA). 30 2011 Tamura and Yasuda designed Spiral Optimization (SO). 31 2011 Rajabioun developed Cuckoo Optimization Algorithm (COA) 32 2011 Rao et al. presented Teaching-Learning-Based Optimization (TLBO) algorithm. 33 2012 Gandomi and Alavi proposed the Krill Herd (KH) Algorithm. 34 2012 Çivicioglu introduced Differential Search Algorithm (DSA). 35 2012 Hajiaghaei-Keshteli and Aminnayeri proposed the Keshtel Algorithm (KA). 36 2013 Husseinzadeh- Kashan provided Optics Inspired Optimization(OIO). 37 2013 Husseinzadeh- Kashan proposed Grouping Evolution Strategies (GES). 38 2014 Gandomi presented Interior Search Algorithm (ISA). 39 2014 Salimi proposed Stochastic Factal Search (SFS). 40 2015 Zheng developed Water Wave Optimization (WWO). 41 2016 Fathollahi Fard and Hajiaghaei-Keshteli proposed Red Deer Algorithm (RDA). 42 2017 Fathollahi Fard and Hajiaghaei-Keshteli presented Social Engineering Optimization (SEO). Meta-heuristics 7
  • 9. Evolutionary Algorithms  Social Engineering (SE) is defined as indirect attacks to obtain the people and reveal their information by using certain techniques (Granger, 2002).  Sarah Granger acknowledged that defense against the Social Engineering attacks has a common pattern such as a mass. In addition, she claimed that the Social Engineering attack procedure has a four step cycle. 9 Social Engineering A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 10.  The phases of Social Engineering are as follows: 1) Training and Retraining 2) Spotting an attack 3) Responding to attack 4) Selecting a new way or choosing some one else A. M. Fathollahi Fard Social Engineering Optimization (SEO) 10 Social Engineering
  • 11. Scottish Red Deer  In the first phase, the training and retraining from attacker to defender is considered. In this regard, the attacker wants to obtain some special information from defender.  This information can be put in different contents. Perhaps, the first questions are about famous special clip video, music, sport and public events that occur in the community and other dimension of personal family systems. 11 Training and Retraining A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 12. Red Deer’s Characteristics  It is obvious that before carrying out an attack, on the point where the probability of success is more than other points, it must be identified.  The attacker takes you (defender) to a position that he/she prefers the defender to be placed in the way of his/her goals.  The most important thing to prevent an attack on his/her main demand is that defender can understand and think like an attacker. 12 Spotting an attack A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 13. Red Deer’s Roaring  The next phase is how to respond this SE attack and react of defender and how much information it wishes to make striker. In SE attacks, the most important phase is how to respond to an attack.  The pervious experiences and his/her knowledge about this kind of attack may be helped him/her. 13 Responding to an attack A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 14. Red Deer’s Mating  At the least, in final step, the attacker try to steal each thing that is may be useful and strike to defender. Or if an attack is not achieved satisfactory results or otherwise offensive repeats or stopped by person and someone else chooses. 14 Selecting a new way or choosing some one else A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 15. Red Deer Algorithm (RDA)  In this algorithm each solution is counterpart to a person and traits of each person such as his/her ability in contents of mathematical, sport, business and so on are the counterpart of all variables of each solution in search space. 15 SEO A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 16. 16A. M. Fathollahi Fard Social Engineering Optimization (SEO) Start Initialize the attacker and the defender Train and retrain Spot an attack Respond to attack Is the number of attacks ended? Select a new person as defender Stopping condition End
  • 17. A. M. Fathollahi Fard Social Engineering Optimization (SEO) 17 Start Initialize the attacker and the defender Train and retrain Spot an attack Respond to attack Is the number of attacks ended? Select a new person as defender Stopping condition End LS
  • 18. A. M. Fathollahi Fard Social Engineering Optimization (SEO) 18 Start Initialize the attacker and the defender Train and retrain Spot an attack Respond to attack Is the number of attacks ended? Select a new person as defender Stopping condition End Int.
  • 19. A. M. Fathollahi Fard Social Engineering Optimization (SEO) 19 Start Initialize the attacker and the defender Train and retrain Spot an attack Respond to attack Is the number of attacks ended? Select a new person as defender Stopping condition End Div.
  • 20. Red Deer Algorithm (RDA) 1. Initialize the attacker and the defender 20 SEO A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 21. Red Deer Algorithm (RDA) 2. Train and retrain 21 SEO A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 22. Red Deer Algorithm (RDA) 3. Spot an attack  Obtaining  Phishing  Diversion theft  Pretext 22 SEO A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 23. Red Deer Algorithm (RDA) 23 Obtaining A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 24. Red Deer Algorithm (RDA) 24 Phishing A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 25. Red Deer Algorithm (RDA) 25 Diversion theft A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 26. Red Deer Algorithm (RDA) 26 Pretext A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 27. Experiments 27 SEO A. M. Fathollahi Fard Social Engineering Optimization (SEO) 4. Respond to attack New position of the defender is evaluated and compared with the old position of the defender.
  • 28. Experiments 28 SEO A. M. Fathollahi Fard Social Engineering Optimization (SEO) 5. Select a new person as the defender Here, the attacker annihilates the defender and selects a new person randomly to perform SE rules. 6. Stopping condition Like other meta-heuristics, the stop condition may be maximum time of the simulation or the quality of the best solution ever found or other selected condition by user.
  • 29. Experiments 29 SEO A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 30. Conclusion  In this part, six famous benchmark functions which have been used in pervious researches are utilized.  These problems are numbered as P1 to P6 and all of them are minimization problems. In all standard functions, the optimum value is equal to zero. Each of them has certain characteristics.  The details on these functions are show in Table 1. 30 Benchmark functions A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 31. Conclusion 31 Benchmark function A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 32. Conclusion 32 Benchmark function A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 33. Conclusion 33 Benchmark function A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 34. Conclusion 34 Benchmark function A. M. Fathollahi Fard Social Engineering Optimization (SEO) The results show the superiority of SEO and its behavior to find the optimal solution. Four versions of SEO are presented in this study based on four proposed techniques. All of them are reached optimal solutions and the second technique is most successful in among other four techniques. In addition, it seems user can choice suitable technique by considering the type and dimension of the problems.
  • 35. Conclusion 35 Engineering problem A. M. Fathollahi Fard Social Engineering Optimization (SEO) In this part, we consider a single machine scheduling problem. Single-machine scheduling or single-resource scheduling is the process of assigning a group of tasks to a single machine or resource.
  • 36. Conclusion 36 Engineering problem A. M. Fathollahi Fard Social Engineering Optimization (SEO)
  • 37. Conclusion 37 Engineering problem A. M. Fathollahi Fard Social Engineering Optimization (SEO) To compare the proposed algorithms, we utilized three powerful methods. GA, ICA and RDA are used in this study. In order, the problems are sorted as well. We define 6 different sizes of problems and assign equal time -0.01 0.01 0.03 0.05 0.07 0.09 0.11 50 100 150 200 250 300 GA ICA RDA SEO_1 SEO_2 SEO_3 SEO_4
  • 38. Conclusion 38 Conclusion A. M. Fathollahi Fard Social Engineering Optimization (SEO)  In this work, a new optimization algorithm, inspired by Social Engineering is developed. This algorithm is so simple and intelligent. Besides, it makes a balance between the phases by creative methods. The result of experiments shows the performance and efficiency of proposed method. For future studies, more comprehensive analyses on the SEO may still required to be explored. Moreover, we can employ some other real techniques in SE attacks to develop the proposed SEO.
  • 39. References  [1] E. Atashpaz-Gargari, C. Lucas, “Imperialist competitive algorithm: an algorithm for optimization inspired by imperialistic competition.” in: IEEE Congress on Evolutionary Computation, Singapore (2007), 4661–4667.  [2] A. Ebrahimi, E. Khamehchi, “Sperm Whale Algorithm: an Effective Metaheuristic Algorithm for Production Optimization Problems.” Journal of Natural Gas Science & Engineering, 29, (2016), 211-222.  [3] A. M. Fathollahi Fard, M. Hajiaghaei-Keshteli, “Red Deer Algorithm (RDA); A New Optimization Algorithm Inspired by Red Deers’ Mating.” 12th International Conference on Industrial Engineering (ICIE 2016), Tehran, Iran, (2016), 34-35.  [4] M. Feldman, D. Biskup, “Single machine scheduling for minimizing earliness and tardiness penalties by meta-heuristic approaches.” Computers & Industrial Engineering, 44, (2003), 307–323.  [5] S. Granger, “Social Engineering Fundamentals, Part I: Hacker Tactics.” Security Focus, December 18, (2001).  [6] S. Granger, “Social Engineering Fundamentals, Part II: Combat Strategies.” Security Focus, January 9, (2002).  [7] M. Hajiaghaei-Keshteli, “The allocation of customers to potential distribution centers in supply chain network; GA and AIA approaches.” Appl. Soft Comput.11, (2011), 2069–2078.  [8] M. Hajiaghaei-Keshteli, M. Aminnayeri, “Keshtel Algorithm (KA); a new optimization algorithm inspired by Keshtels’ feeding.” Proceeding in IEEE Conference on Industrial Engineering and Management Systems (2013), 2249–2253.  [9] M. Hajiaghaei-Keshteli, M. Aminnayeri, “Solving the integrated scheduling of production rail transportation problem by Keshtel algorithm.” Applied Soft Computing, 25, (2014), 184–203.  [10] M. Hajiaghaei-Keshteli, S. Molla-Alizadeh-Zavardehi, R. Tavakkoli-Moghaddam, “Addressing a nonlinear fixed-charge transportation problem using a spanning tree-based genetic algorithm.” Computers and Industrial Engineering, 59, (2010), 259–271.  [11] J. H. Holland, Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence, University of Michigan Press, Michigan, Ann Arbor, (1975).  [12] J. A. Hoogeveen, S. L. van de Velde, “Scheduling around small common due date.” European Journal of Operational Research, 55, (1991), 237-242.  [13] R. J. W. James, “Using tabu search to solve the common due date early-tardy machine scheduling problem.” Computers and Operation Research, 24, (1997), 199-208.  [14] D. Karaboga, B. Akay, “A comparative study of Artificial Bee Colony algorithm.” Applied Mathematics and Computation, 214, (2009), 108–132.  [15] J. Kennedy, R. Eberhart, “Particle swarm optimization.” Proc. IEEE Int. Conf. Neural Networks. Perth, Australia, (1995), 1942-1945.  [16] S. Kirkpatrick, C. D. Gelatto, M. P. Vecchi, “Optimization by simulated annealing.” Science, 220, (1983), 671-680.  [17] C. Y. Lee, S. J. Kim, “Parallel genetic algorithms for the earliness–tardiness job scheduling problem with general penalty weights.” Computers & Industrial Engineering, 28, (1995), 231–243.  [18] X. R. Luo, R. Brody, A. Seazzu, S. Burd, “Social Engineering: The Neglected Human Factor for.” Managing Information Resources and Technology: Emerging Applications and Theories, (2013), 151.  [19] S. Mirjalili, “SCA: A Sine Cosine Algorithm for Solving Optimization Problems.” Knowledge-Based Systems, 96, (2016), 120-133.  [20] S. Mirjalili, A. Lewis, “The Whale Optimization Algorithm.” Advances in Engineering Software, 95, (2016), 51-67.  [21] S. Nazeri-Shirkouhi, H. Eivazy, R. Ghodsi, K. Rezaie, E. Atashpaz-Gargari, “Solving the integrated product mix outsourcing problem using the Imperialist Competitive Algorithm.” Expert Systems with Applications, 37, (2010), 7615–7626.  [22] A. M. Weinberg, “Can technology replace social engineering?” Bulletin of the Atomic Scientist, 22, (10), (1966), 4-8.  [23] X.S. Yang, “Nature-inspired Metaheurisitc Algorithm.” Luniver Press, (2008).  [24] Yu-Jun Zheng, “Water Wave Optimization: A new nature-inspired metaheuristic.” Computers & Operations Research, 55, (2015), 1–11. 39 References
  • 40. Thank You for Your Attention Any Question?