Comprehensive evaluation of intrusion detection systems based on fuzzy methods

被引:0
|
作者
School of Information Engineering, Beijing University of Science and Technology, Beijing 100083, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Gongcheng | 2006年 / 8卷 / 155-156+234期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] A fuzzy comprehensive evaluation based distributed intrusion detection
    Ouyang, MG
    Wang, WN
    Zhang, YT
    2002 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-4, PROCEEDINGS, 2002, : 281 - 284
  • [2] Managing intrusion-detection alerts based on fuzzy comprehensive evaluation
    Mu, CP
    Huang, HK
    Tian, SF
    Proceedings of the 8th Joint Conference on Information Sciences, Vols 1-3, 2005, : 140 - 143
  • [3] Intrusion detection alert verification based on multi-level fuzzy comprehensive evaluation
    Mu, CP
    Huang, HK
    Tian, SF
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 1, PROCEEDINGS, 2005, 3801 : 9 - 16
  • [4] Intrusion detection system alerts fusion based on fuzzy comprehensive evaluation and immune evolution
    Liu, Jiaomin
    Li, Yongzheng
    Meng, Junying
    Wang, Zhenzhou
    Journal of Computational Information Systems, 2013, 9 (04): : 1509 - 1516
  • [5] Fuzzy Based Intrusion Detection Systems in MANET
    Balan, Vishnu E.
    Priyan, M. K.
    Gokulnath, C.
    Devi, Usha G.
    BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 : 109 - 114
  • [6] Fuzzy-Based Intrusion Detection Systems
    Cisar, Sanja Maravic
    Cisar, Petar
    Pinter, Robert
    SECURITY-RELATED ADVANCED TECHNOLOGIES IN CRITICAL INFRASTRUCTURE PROTECTION: THEORETICAL AND PRACTICAL APPROACH, 2022, : 205 - 215
  • [7] Machine Learning-Based Intrusion Detection Methods in IoT Systems: A Comprehensive Review
    Kikissagbe, Brunel Rolack
    Adda, Meddi
    ELECTRONICS, 2024, 13 (18)
  • [8] Applications of fuzzy data mining methods for intrusion detection systems
    Guan, J
    Liu, DX
    Wang, T
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 3, 2004, 3045 : 706 - 714
  • [9] Fuzzy Logic based Network Intrusion Detection Systems
    Johanyak, Zsolt Csaba
    2020 IEEE 18TH WORLD SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS (SAMI 2020), 2020, : 15 - 15
  • [10] Computer systems threat evaluation: An agent-based and fuzzy logic intrusion detection architecture
    Hamed, E
    Graham, J
    Elmaghraby, A
    INTELLIGENT SYSTEMS, 2001, : 23 - 26