G Creech, J Hu - 2013 IEEE wireless communications and …, 2013 - ieeexplore.ieee.org
Intrusion detection systems are generally tested using datasets compiled at the end of last century, justified by the need for publicly available test data and the lack of any other …
DJ Betz, T Stevens - Security Dialogue, 2013 - journals.sagepub.com
This article is an attempt to interrogate some of the predominant forms of analogical reasoning within current cyber-security discourse, with a view to clarifying their unstated …
RA Wipfel - US Patent 8,468,518, 2013 - Google Patents
US8468518B2 - System and method for creating a customized installation on demand - Google Patents US8468518B2 - System and method for creating a customized installation …
RA Zitar, A Hamdan - Artificial Intelligence Review, 2013 - Springer
Spam is a serious universal problem which causes problems for almost all computer users. This issue affects not only normal users of the internet, but also causes a big problem for …
S Praneet, B Verma, S Sharma - … on Bio-Inspired Computing: Theories and …, 2013 - Springer
Exponential growth of internet acted as a centrifugal force in the development of a whole new array of applications and services which drives the e-business/commerce globally. Now …
A Garg, S Upadhyaya, K Kwiat - Handbook of Statistics, 2013 - Elsevier
Masquerading attack refers to conducting malicious activities on a computer system by impersonating another user. Such attacks are difficult to detect with standard intrusion …
A mutation operator is critical for the performance of a clonal selection algorithm (CSA) since it diversifies the search directions and avoids early convergence to local optima. This article …
In digitalization era, credit card fraud detection is of high significance to financial organizations. This paper discussed about credit card fraud detection by parallelizing of …