For the last two decades, artificial immune systems have been studied in various fields of knowledge. They were shown to be particularly effective tools at detecting anomalous …
E Bonyah, A Atangana, MA Khan - Asia Pacific Journal on Computational …, 2017 - Springer
The concept of information science is inevitable in the human development as science and technology has become the driving force of all economics. The connection of one human …
To increase the security of intrusion detection system, generalized structure of highly performance adaptive system for cyber attacks detection was developed. To improve its …
ABSTRACT Intrusion Detection System (IDS) helps us to identify the abnormalities and attacks that can affect the confidentiality, integrity, and availability of the system or network …
R Zhu, Y Huang - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Edit distance is an important non-linear metric that has many applications ranging from matching patient genomes to text-based intrusion detection. Depends on the application …
Governments have strongly recognized that critical infrastructures (CIs) play crucial roles in underpinning economy, security and societal welfare of countries. The proper functioning of …
In this paper, we propose a new approach to the performance supervision of complex and heterogeneous infrastructures found in hybrid cloud networks, which typically consist of …
L Zhu - Comput. Inf. Sci., 2017 - pdfs.semanticscholar.org
Abstract linguistic steganalysis is a technique that discovering potentially hidden information embedded through using linguistically in plain text using. Varieties of syntax and multi …
This dissertation presents the design, development, and simulation testing of a monitoring and control framework for dynamic systems using artificial intelligence techniques. A …