Buscar
Mostrando ítems 1-10 de 239
Performance evaluation of the fuzzy ARTMAP for network intrusion detection
(2012-10-25)
Recently, considerable research work have been conducted towards finding fast and accurate pattern classifiers for training Intrusion Detection Systems (IDSs). This paper proposes using the so called Fuzzy ARTMAT classifier ...
Performance evaluation of the fuzzy ARTMAP for network intrusion detection
(2012-10-25)
Recently, considerable research work have been conducted towards finding fast and accurate pattern classifiers for training Intrusion Detection Systems (IDSs). This paper proposes using the so called Fuzzy ARTMAT classifier ...
An attack signature model to computer security intrusion detection
(2002-12-01)
Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing to establish profiles or patterns. This well-known behavior is the basis of ...
An attack signature model to computer security intrusion detection
(2002-12-01)
Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing to establish profiles or patterns. This well-known behavior is the basis of ...
Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems
Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system ...
An Optimum-Path Forest framework for intrusion detection in computer networks
(Pergamon-Elsevier B.V. Ltd, 2012-09-01)
Intrusion detection systems that make use of artificial intelligence techniques in order to improve effectiveness have been actively pursued in the last decade. However, their complexity to learn new attacks has become ...
An Optimum-Path Forest framework for intrusion detection in computer networks
(Pergamon-Elsevier B.V. Ltd, 2012-09-01)
Intrusion detection systems that make use of artificial intelligence techniques in order to improve effectiveness have been actively pursued in the last decade. However, their complexity to learn new attacks has become ...