To identify suspicious activity in anomaly detection based on soft computing
AIA'06 Proceedings of the 24th IASTED international conference on Artificial intelligence and applications
An effective intrusion detection method using optimal hybrid model of classifiers
Journal of Computational Methods in Sciences and Engineering - Special Supplement Issue in Section A and B: Selected Papers from the ISCA International Conference on Software Engineering and Data Engineering, 2009
A fusion of ICA and SVM for detection computer attacks
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Attack scenario construction based on rule and fuzzy clustering
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
A novel network intrusion attempts prediction model based on fuzzy neural network
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part I
Applying mining fuzzy association rules to intrusion detection based on sequences of system calls
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Fuzzy data mining: a literature survey and classification framework
International Journal of Networking and Virtual Organisations
Hi-index | 0.00 |
Mass user adoption is often a good indication of atechnology's success. We argue that the vision laid out bysome distributed computing system (DCS) pioneer that"almost everyone who uses a pencil will use a computer"is still unrealized. We review the ...