[图书][B] Rough-neural Computing: Techniques for computing with words
SK Pal, L Polkowski - 2012 - books.google.com
Soft computing comprises various paradigms dedicated to approximately solving real-world
problems, eg in decision making, classification or learning; among these paradigms are …
problems, eg in decision making, classification or learning; among these paradigms are …
[图书][B] Perception-based data processing in acoustics: Applications to music information retrieval and psychophysiology of hearing
B Kostek - 2005 - books.google.com
This monograph provides novel insights into cognitive mechanisms underlying the
processing of sound and music in different environments. A solid understanding of these …
processing of sound and music in different environments. A solid understanding of these …
[PDF][PDF] Artificial immune network clustering approach for anomaly intrusion detection
Many Intrusion Detection approaches (IDS) have been developed in the literature. Signature
based approaches for anomaly detection need to be updated with the latest signatures of …
based approaches for anomaly detection need to be updated with the latest signatures of …
Feature selection using Rough-DPSO in anomaly intrusion detection
Most of the existing IDS use all the features in network packet to evaluate and look for known
intrusive patterns. Some of these features are irrelevant and redundant. The drawback to this …
intrusive patterns. Some of these features are irrelevant and redundant. The drawback to this …
[HTML][HTML] Category-based intrusion detection using PCA
GR Zargar, T Baghaie - Journal of Information Security, 2012 - scirp.org
Existing Intrusion Detection Systems (IDS) examine all the network features to detect
intrusion or misuse patterns. In feature-based intrusion detection, some selected features …
intrusion or misuse patterns. In feature-based intrusion detection, some selected features …
Rough set methods in power system fault classification
X Xu, JF Peters - IEEE CCECE2002. Canadian conference on …, 2002 - ieeexplore.ieee.org
This paper presents an approach to classifying power system faults using rough set
methods. A knowledge-based fault detection and identification (FDI) system for power …
methods. A knowledge-based fault detection and identification (FDI) system for power …
Identification of effective network features to detect Smurf attacks
GR Zargar, P Kabiri - 2009 IEEE Student Conference on …, 2009 - ieeexplore.ieee.org
Intrusion detection system (IDS) detects intrusion attempts on computer systems. In intrusion
detection systems, feature reduction, feature extraction and feature selection play important …
detection systems, feature reduction, feature extraction and feature selection play important …
Identification of effective network features for probing attack detection
GR Zargar, P Kabiri - 2009 First International Conference on …, 2009 - ieeexplore.ieee.org
Existing intrusion detection techniques emphasize on building intrusion detection model
based on all features provided. But not all the features are relevant ones and some of them …
based on all features provided. But not all the features are relevant ones and some of them …
IDS in telecommunication network using PCA
Data Security has become a very serious part of any organizational information system.
Internet threats have become more intelligent so it can deceive the basic security solutions …
Internet threats have become more intelligent so it can deceive the basic security solutions …
Selection of effective network parameters in attacks for intrusion detection
GR Zargar, P Kabiri - Advances in Data Mining. Applications and …, 2010 - Springer
Abstract Current Intrusion Detection Systems (IDS) examine a large number of data features
to detect intrusion or misuse patterns. Some of the features may be redundant or with a little …
to detect intrusion or misuse patterns. Some of the features may be redundant or with a little …