AGFS: Adaptive Genetic Fuzzy System for medical data classification

B Dennis, S Muthukrishnan - Applied Soft Computing, 2014 - Elsevier
Abstract A Genetic Fuzzy System (GFS) is basically a fuzzy system augmented by a learning
process based on a genetic algorithm (GA). Fuzzy systems have demonstrated their ability to …

[PDF][PDF] Intrusion detection and prevention system: issues and challenges

BM Beigh, U Bashir, M Chahcoo - International Journal of …, 2013 - researchgate.net
In In spite of the tremendous growth of technologies in computer networking and information
technology, still we lack in preventing our resources from theft/attacks. This problem is very …

An Empirical Evaluation On Comparative Machine Learning Techniques For Detection of The Distributed Denial of Service (DDoS) Attacks

A Ojugo, AO Eboka - Journal of Applied Science …, 2020 - jpabdimas.idjournal.eu
The advent of the Internet that aided the efficient sharing of resources. Also, it has introduced
adversaries whom are today restlessly in their continued efforts at an effective, non …

[PDF][PDF] Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller.

F Geramiraz, AS Memaripour, M Abbaspour - Int. J. Netw. Secur., 2012 - ijns.jalaxy.com.tw
The main feature of anomaly-based intrusion detection systems is detection of new attacks
in the networks, even though numerous false alarms are caused in order to disregard this …

Comparative study for feature selection algorithms in intrusion detection system

K Anusha, E Sathiyamoorthy - Automatic Control and Computer Sciences, 2016 - Springer
Abstract The Intrusion Detection System (IDS) deals with the huge amount of network data
that includes redundant and irrelevant features causing slow training and testing procedure …

[PDF][PDF] Evolving rules using genetic fuzzy approach-an educational case study

K Mankad, PS Sajja, R Akerkar - International Journal on Soft …, 2011 - academia.edu
The work presents design and development of a system to automatically evolve rules
through genetic-fuzzy approach. The work highlights the advantages of genetic and fuzzy …

Early detection of network element outages based on customer trouble calls

Ž Deljac, M Randić, G Krčelić - Decision Support Systems, 2015 - Elsevier
This paper deals with the issue of early detection of network element outages. Timeliness of
outage detection as well as accuracy in finding outages on equipment in a …

A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment

A Nezarat, Y Shams - The Journal of Supercomputing, 2017 - Springer
Cloud computing is a pool of scalable virtual resources serving a large number of users who
pay fees depending on the extent of utilized service. From payment perspective, cloud is like …

Improving network security using machine learning techniques

S Akbar, JA Chandulal, KN Rao… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
Discovery of malicious correlations in computer networks has been an emergent problem
motivating extensive research in computer science to develop improved intrusion detecting …

Soft computing‐based intrusion detection system with reduced false positive rate

DG Bhatti, PV Virparia - … and Analysis of Security Protocol for …, 2020 - Wiley Online Library
Summary Intrusion Detection System is one of the important security mechanisms in today's
information era. Two different approaches are used for intrusion detection: signature based …