[图书][B] Rough-neural Computing: Techniques for computing with words

SK Pal, L Polkowski - 2012 - books.google.com
Soft computing comprises various paradigms dedicated to approximately solving real-world
problems, eg in decision making, classification or learning; among these paradigms are …

[图书][B] Perception-based data processing in acoustics: Applications to music information retrieval and psychophysiology of hearing

B Kostek - 2005 - books.google.com
This monograph provides novel insights into cognitive mechanisms underlying the
processing of sound and music in different environments. A solid understanding of these …

[PDF][PDF] Artificial immune network clustering approach for anomaly intrusion detection

MA Rassam, MA Maarof - Journal of Advances in Information Technology, 2012 - jait.us
Many Intrusion Detection approaches (IDS) have been developed in the literature. Signature
based approaches for anomaly detection need to be updated with the latest signatures of …

Feature selection using Rough-DPSO in anomaly intrusion detection

A Zainal, MA Maarof, SM Shamsuddin - … 26-29, 2007. Proceedings, Part I 7, 2007 - Springer
Most of the existing IDS use all the features in network packet to evaluate and look for known
intrusive patterns. Some of these features are irrelevant and redundant. The drawback to this …

[HTML][HTML] Category-based intrusion detection using PCA

GR Zargar, T Baghaie - Journal of Information Security, 2012 - scirp.org
Existing Intrusion Detection Systems (IDS) examine all the network features to detect
intrusion or misuse patterns. In feature-based intrusion detection, some selected features …

Rough set methods in power system fault classification

X Xu, JF Peters - IEEE CCECE2002. Canadian conference on …, 2002 - ieeexplore.ieee.org
This paper presents an approach to classifying power system faults using rough set
methods. A knowledge-based fault detection and identification (FDI) system for power …

Identification of effective network features to detect Smurf attacks

GR Zargar, P Kabiri - 2009 IEEE Student Conference on …, 2009 - ieeexplore.ieee.org
Intrusion detection system (IDS) detects intrusion attempts on computer systems. In intrusion
detection systems, feature reduction, feature extraction and feature selection play important …

Identification of effective network features for probing attack detection

GR Zargar, P Kabiri - 2009 First International Conference on …, 2009 - ieeexplore.ieee.org
Existing intrusion detection techniques emphasize on building intrusion detection model
based on all features provided. But not all the features are relevant ones and some of them …

IDS in telecommunication network using PCA

MF Elrawy, TK Abdelhamid, AM Mohamed - arXiv preprint arXiv …, 2013 - arxiv.org
Data Security has become a very serious part of any organizational information system.
Internet threats have become more intelligent so it can deceive the basic security solutions …

Selection of effective network parameters in attacks for intrusion detection

GR Zargar, P Kabiri - Advances in Data Mining. Applications and …, 2010 - Springer
Abstract Current Intrusion Detection Systems (IDS) examine a large number of data features
to detect intrusion or misuse patterns. Some of the features may be redundant or with a little …