Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection
ABSTRACT Network Intrusion Detection System (NIDS) is often used to classify network
traffic in an attempt to protect computer systems from various network attacks. A major …
traffic in an attempt to protect computer systems from various network attacks. A major …
Anomaly intrusions detection based on support vector machines with an improved bat algorithm
AC Enache, V Sgârciu - 2015 20th international conference on …, 2015 - ieeexplore.ieee.org
The continuous proliferation of more complex and various security threats leads to the
conclusion that new solutions are required. Intrusion Detection Systems can be a pertinent …
conclusion that new solutions are required. Intrusion Detection Systems can be a pertinent …
Intelligent feature selection method rooted in Binary Bat Algorithm for intrusion detection
AC Enache, V Sgarciu… - 2015 IEEE 10th Jubilee …, 2015 - ieeexplore.ieee.org
The multitude of hardware and software applications generate a lot of data and burden
security solutions that must acquire informations from all these heterogenous systems …
security solutions that must acquire informations from all these heterogenous systems …
Enhanced intrusion detection system based on bat algorithm-support vector machine
AC Enache, V Sgarciu - 2014 11th International conference on …, 2014 - ieeexplore.ieee.org
As new security intrusions arise so does the demand for viable intrusion detection systems
These solutions must deal with huge data volumes, high speed network traffics and …
These solutions must deal with huge data volumes, high speed network traffics and …
A feature selection approach implemented with the binary bat algorithm applied for intrusion detection
AC Enache, V Sgârciu - 2015 38th International conference on …, 2015 - ieeexplore.ieee.org
The large number and various technological solutions adopted by many enterprises,
overwhelms security systems, which must acquire informations from all these diverse …
overwhelms security systems, which must acquire informations from all these diverse …
An improved bat algorithm driven by support vector machines for intrusion detection
AC Enache, V Sgarciu - International Joint Conference: CISIS'15 and …, 2015 - Springer
Today, the never-ending stream of security threats requires new security solutions capable
to deal with large data volumes and high speed network connections in real-time. Intrusion …
to deal with large data volumes and high speed network connections in real-time. Intrusion …
An immune intelligent approach for security assurance
AC Enache, M Ioniţă, V Sgârciu - … International Conference on …, 2015 - ieeexplore.ieee.org
Information Security Assurance implies ensuring the integrity, confidentiality and availability
of critical assets for an organization. The large amount of events to monitor in a fluid system …
of critical assets for an organization. The large amount of events to monitor in a fluid system …
INTRUSION DETECTION SYSTEM BASED ON SUPPORT VECTOR MACHINES AND THE TWO-PHASE BAT ALGORITHM.
ED Erigha, FE Ayo, OO Dada… - Journal of Information …, 2017 - search.ebscohost.com
Network Intrusions have become a pervasive threat to online ecosystems. Hence the need
for an effective Intrusion Detection System (IDS) to safeguard and protect assets from a …
for an effective Intrusion Detection System (IDS) to safeguard and protect assets from a …
[PDF][PDF] Detecting TCP SYN Flood Attack in the Cloud
In this paper, an approach to protecting virtual machines (VMs) against TCP SYN flood
attack in a cloud environment is proposed. An open source cloud platform Eucalyptus is …
attack in a cloud environment is proposed. An open source cloud platform Eucalyptus is …
[PDF][PDF] Modelling of Key Performance Indicators for Staff Advancement in Higher Institutions of Learning---A fuzzy logic approach
RE Peter, AR Ajiboye, M Kareyo - Institutions, 2019 - afrjmis.net
ABSTRACT Key Performance Indicators (KPIs) are variables for performance assessment. It
is paramount to measure or evaluate the qualities of an individual's performance periodically …
is paramount to measure or evaluate the qualities of an individual's performance periodically …