Intrusion detection systems and techniques: a review

BS Bhati, CS Rai - International Journal of Critical …, 2016 - inderscienceonline.com
In the modern age of technology, we can transmit data from one place to another in very
small amounts of time. Network, in computer science is the telecommunication network that …

Gravitational search algorithm–optimized neural misuse detector with selected features by fuzzy grids–based association rules mining

M Sheikhan, M Sharifi Rad - Neural Computing and Applications, 2013 - Springer
Feature selection is one of the most important techniques for data preprocessing in
classification problems. In this paper, fuzzy grids–based association rules mining, as an …

A Security Situation Prediction Model for Industrial Control Network Based on EP-CMA-ES

Y Wang, Y Yang, R Gao, S Li, Y Zhao - IEEE Access, 2023 - ieeexplore.ieee.org
To solve the problem of industrial control network (ICN) security situation prediction, this
paper proposes a security situation prediction model for ICN based on evidential reasoning …

Multi-source alert data understanding for security semantic discovery based on rough set theory

Y Yao, Z Wang, C Gan, Q Kang, X Liu, Y Xia, L Zhang - Neurocomputing, 2016 - Elsevier
To secure the network system, a large number of different information security devices, eg,
intrusion detection system, firewall, etc., have been deployed in the network. These devices …

Machine translation with javanese speech levels' classification

A Nafalski, AP Wibawa - Informatyka, Automatyka, Pomiary w …, 2016 - yadda.icm.edu.pl
A hybrid corpus-based machine processing has been developed to produce a proper
Javanese speech level translation. The developed statistical memory-based machine …

Using particle swarm optimization in fuzzy association rules‐based feature selection and fuzzy ARTMAP‐based attack recognition

M Sheikhan, M Sharifi Rad - Security and Communication …, 2013 - Wiley Online Library
Feature selection is a classic research topic in data mining, and it has attracted much
interest in many fields such as network security. In addition, data mining approaches such as …

[PDF][PDF] Decision support system for zero-day attack response

HK Kim, SK Kim, SH Kim - Applied Mathematics and Information …, 2012 - researchgate.net
Regardless of the existence of the various information security safeguards, many companies
remain vulnerable to the unknown attack, which is known as the zero-day attack. In this …

[引用][C] IMPLEMENTASI SISTEM PAKAR PREDIKSI KERUSAKAN KOMPUTER MENGGUNAKAN METODE CERTAINTY FACTOR BERBASIS WEB …

W PRABOWO - 2024 - UNIVESITAS PELITA BANGSA