Parallel distributed processing: explorations in the microstructure of cognition, vol. 1: foundations
Introduction to Multiagent Systems
Introduction to Multiagent Systems
Complexity of Multi-agent Systems Behavior
JELIA '02 Proceedings of the European Conference on Logics in Artificial Intelligence
Principles of Artificial Neural Networks
Principles of Artificial Neural Networks
Review: A review of machine learning approaches to Spam filtering
Expert Systems with Applications: An International Journal
Introduction to Genetic Algorithms
Introduction to Genetic Algorithms
Hierarchical audio content classification system using an optimal feature selection algorithm
Multimedia Tools and Applications
A knowledge-based framework for image enhancement in aviation security
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Lung cancer cell identification based on artificial neural network ensembles
Artificial Intelligence in Medicine
Breast cancer detection using cartesian genetic programming evolved artificial neural networks
Proceedings of the 14th annual conference on Genetic and evolutionary computation
Hi-index | 0.00 |
With the volume of data required to be analysed and interpreted by security analysts, the possibility of human error looms large and the consequences possibly harmful for some systems in the event of an adverse event not being detected. In this paper we suggest machine learning algorithms that can assist in supporting the security function effectively and present a framework that can be used to choose the best algorithm for a specific domain. A qualitative framework was produced, and it is suggested that a naive Bayesian classifier and artificial neural network based algorithms are most likely the best candidates for the proposed application. A testing framework is proposed to conduct a quantitative evaluation of the algorithms as the next step in the determination of best fit for purpose algorithm. Future research will look to repeat this process for cyber security specific applications, and also examine GPGPU optimisations.