AGFS: Adaptive Genetic Fuzzy System for medical data classification
B Dennis, S Muthukrishnan - Applied Soft Computing, 2014 - Elsevier
Abstract A Genetic Fuzzy System (GFS) is basically a fuzzy system augmented by a learning
process based on a genetic algorithm (GA). Fuzzy systems have demonstrated their ability to …
process based on a genetic algorithm (GA). Fuzzy systems have demonstrated their ability to …
[PDF][PDF] Intrusion detection and prevention system: issues and challenges
In In spite of the tremendous growth of technologies in computer networking and information
technology, still we lack in preventing our resources from theft/attacks. This problem is very …
technology, still we lack in preventing our resources from theft/attacks. This problem is very …
An Empirical Evaluation On Comparative Machine Learning Techniques For Detection of The Distributed Denial of Service (DDoS) Attacks
The advent of the Internet that aided the efficient sharing of resources. Also, it has introduced
adversaries whom are today restlessly in their continued efforts at an effective, non …
adversaries whom are today restlessly in their continued efforts at an effective, non …
[PDF][PDF] Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller.
F Geramiraz, AS Memaripour, M Abbaspour - Int. J. Netw. Secur., 2012 - ijns.jalaxy.com.tw
The main feature of anomaly-based intrusion detection systems is detection of new attacks
in the networks, even though numerous false alarms are caused in order to disregard this …
in the networks, even though numerous false alarms are caused in order to disregard this …
Comparative study for feature selection algorithms in intrusion detection system
K Anusha, E Sathiyamoorthy - Automatic Control and Computer Sciences, 2016 - Springer
Abstract The Intrusion Detection System (IDS) deals with the huge amount of network data
that includes redundant and irrelevant features causing slow training and testing procedure …
that includes redundant and irrelevant features causing slow training and testing procedure …
[PDF][PDF] Evolving rules using genetic fuzzy approach-an educational case study
K Mankad, PS Sajja, R Akerkar - International Journal on Soft …, 2011 - academia.edu
The work presents design and development of a system to automatically evolve rules
through genetic-fuzzy approach. The work highlights the advantages of genetic and fuzzy …
through genetic-fuzzy approach. The work highlights the advantages of genetic and fuzzy …
Early detection of network element outages based on customer trouble calls
Ž Deljac, M Randić, G Krčelić - Decision Support Systems, 2015 - Elsevier
This paper deals with the issue of early detection of network element outages. Timeliness of
outage detection as well as accuracy in finding outages on equipment in a …
outage detection as well as accuracy in finding outages on equipment in a …
A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment
A Nezarat, Y Shams - The Journal of Supercomputing, 2017 - Springer
Cloud computing is a pool of scalable virtual resources serving a large number of users who
pay fees depending on the extent of utilized service. From payment perspective, cloud is like …
pay fees depending on the extent of utilized service. From payment perspective, cloud is like …
Improving network security using machine learning techniques
S Akbar, JA Chandulal, KN Rao… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
Discovery of malicious correlations in computer networks has been an emergent problem
motivating extensive research in computer science to develop improved intrusion detecting …
motivating extensive research in computer science to develop improved intrusion detecting …
Soft computing‐based intrusion detection system with reduced false positive rate
DG Bhatti, PV Virparia - … and Analysis of Security Protocol for …, 2020 - Wiley Online Library
Summary Intrusion Detection System is one of the important security mechanisms in today's
information era. Two different approaches are used for intrusion detection: signature based …
information era. Two different approaches are used for intrusion detection: signature based …