A survey and taxonomy of the fuzzy signature-based intrusion detection systems

M Masdari, H Khezri - Applied Soft Computing, 2020 - Elsevier
Organizations that benefit from information technologies are vulnerable to various attacks
and malicious behaviors. Intrusion Detection Systems (IDS) are one of the main lines of …

Fuzzy logic for situation awareness: a systematic review

G D'Aniello - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Situation awareness is the cognitive capability of human and artificial agents to perceive,
understand and predict the status of the situation in an environment. Situation awareness …

Towards fuzzy anomaly detection-based security: a comprehensive review

M Masdari, H Khezri - Fuzzy Optimization and Decision Making, 2021 - Springer
In the data security context, anomaly detection is a branch of intrusion detection that can
detect emerging intrusions and security attacks. A number of anomaly detection systems …

Using pattern-of-life as contextual information for anomaly-based intrusion detection systems

FJ Aparicio-Navarro, KG Kyriakopoulos, Y Gong… - IEEE …, 2017 - ieeexplore.ieee.org
As the complexity of cyber-attacks keeps increasing, new robust detection mechanisms
need to be developed. The next generation of Intrusion Detection Systems (IDSs) should be …

Using the pattern-of-life in networks to improve the effectiveness of intrusion detection systems

FJ Aparicio-Navarro, JA Chambers… - 2017 IEEE …, 2017 - ieeexplore.ieee.org
As the complexity of cyber-attacks keeps increasing, new and more robust detection
mechanisms need to be developed. The next generation of Intrusion Detection Systems …

On the Possibility of Using Cognitive Approaches in Information Security Tasks

AV Telny, MY Monakhov… - 2021 Dynamics of …, 2021 - ieeexplore.ieee.org
This article analyzes the possibilities of using cognitive approaches in forming expert
assessments for solving information security problems. The experts use the contextual …

[PDF][PDF] Protection of mobile and wireless networks against service availability attacks

G Escudero-Andreu - 2018 - repository.lboro.ac.uk
Cellular and wireless communications are widely used as preferred technology for
accessing network services due to their flexibility and cost-effective deployment. 4G (4th …

[PDF][PDF] 5.3 Automated statistical anomaly detection and incongruence determination

C Zor, J Kittler, W Wang, I Kaloskampis, Y Hicks… - In Signal … - researchgate.net
The problem of anomaly detection in machine perception has received substantial interest
over the last decade. As the notion of an anomaly depends on the user and context, various …

[PDF][PDF] Protection of Mobile and Wireless Networks Against Service Availability Attacks

GE Andreu - 2018 - core.ac.uk
Cellular and wireless communications are widely used as preferred technology for
accessing network services due to their flexibility and cost-effective deployment. 4G (4th …