Encrypted communication on the Internet using the HTTPs protocol represents a challenging task for network intrusion detection systems. While it significantly helps to preserve users' …
X Deng, W Jiang, Z Wang - Applied Mathematics and Computation, 2020 - Elsevier
Abstract Information source selection (ISS) is ubiquitous across a myriad of scientific disciplines. Previous studies mainly viewed the issue of ISS as a multi-criteria decision …
Home assistant chat-bots, self-driving cars, drones or automated negotiations are some of the several examples of autonomous (artificial) agents that have pervaded our society …
O McCusker, S Brunza… - 2013 5th International …, 2013 - ieeexplore.ieee.org
Establishing long-view situation awareness of threat agents requires an operational capability that scales to large volumes of network data, leveraging the past to make-sense of …
We present a mechanism for autonomous self-adaptation of a network-based intrusion detection system (IDS). The system is composed of a set of cooperating agents, each of …
Abstract Collaborative Intrusion Detection Networks (CIDN) are usually composed by a set of nodes working together to detect distributed intrusions that cannot be easily recognized …
We present a self-adaptation mechanism for Network Intrusion Detection System which uses a game-theoretical mechanism to increase system robustness against targeted attacks on …
We present a self-adaptation mechanism for Network Intrusion Detection System which uses a game-theoretical mechanism to increase system robustness against targeted attacks on …
Анотація Розмір пояснювальної записки–92 аркуші, містить 14 ілюстрацій, 32 таблиці, 3 додатки, 26 посилань на джерела. Актуальність теми. Локальні комп'ютерні мережі …