A bio-inspired hybrid artificial intelligence framework for cyber security

K Demertzis, L Iliadis - Computation, cryptography, and network security, 2015 - Springer
Abstract Confidentiality, Integrity, and Availability of Military information is a crucial and
critical factor for a country's national security. The security of military information systems …

Analysis of the impact of clustering techniques and parameters on evolutionary-based hybrid models for forecasting electricity consumption

S Oladipo, Y Sun, A Amole - IEEE Access, 2023 - ieeexplore.ieee.org
Electricity is undeniably one of the most crucial building blocks of high-quality life all over the
world. Like many other African countries, Nigeria is still grappling with the challenge of the …

A hybrid network anomaly and intrusion detection approach based on evolving spiking neural network classification

K Demertzis, L Iliadis - E-Democracy, Security, Privacy and Trust in a …, 2014 - Springer
The evolution of network services is closely connected to the understanding and modeling of
their corresponding traffic. The obtained conclusions are related to a wide range of …

Analisis perbandingan metode fuzzy C-means dan subtractive fuzzy C-means

BN Haqiqi, R Kurniawan - Media Statistika, 2015 - ejournal.undip.ac.id
Abstract Fuzzy C-Means (FCM) is one of the most frequently used clustering method.
However FCM has some disadvantages such as number of clusters to be prespecified and …

A novel weighted fuzzy C–means clustering based on immune genetic algorithm for intrusion detection

S Ganapathy, K Kulothungan, P Yogesh, A Kannan - Procedia Engineering, 2012 - Elsevier
In this paper, we propose a fuzzy clustering model to find the proper cluster structures from a
dataset used for intrusion detection. Since, genetic algorithm is an effective technique to …

Clustering-based compression connected to cloud databases in telemedicine and long-term care applications

WY Hsu - Telematics and Informatics, 2017 - Elsevier
A novel clustering-based compression work connected to cloud databases is proposed for
the applications of telemedicine and long-term care in this study, where the goal is to …

Segmentation-based compression: New frontiers of telemedicine in telecommunication

WY Hsu - Telematics and Informatics, 2015 - Elsevier
This study proposes a novel segmentation-based compression scheme for new frontiers of
telemedicine in telecommunication, where the aim is to improve the information transfer and …

[PDF][PDF] Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system

DAA Zainaddin, ZM Hanapi - Journal of Computer Science, 2013 - researchgate.net
ABSTRACT Intrusion Detection System (IDS) is one of the component that take part in the
system defence, to identify abnormal activities happening in the computer system …

Brain–computer interface: the next frontier of telemedicine in human–computer interaction

WY Hsu - Telematics and Informatics, 2015 - Elsevier
The study proposes a novel brain–computer interface scheme for the next frontier of
telemedicine in human–computer interaction, where the goal is to improve the interactions …

[图书][B] Computation, cryptography, and network security

NJ Daras, MT Rassias - 2015 - Springer
This book entitled Computation, Cryptography, and Network Security brings together a
broad variety of mathematical methods and theories with several applications from a number …