A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Special issue on computational intelligence in cyber security [Preface]
2008
IEEE Computational Intelligence Magazine
In order to protect large cyber infrastructure, we need flexible, adaptable and robust cyber defense systems, which can make intelligent decisions (in near real-time) in detecting a wide variety of threats ...
typically include fuzzy logic, evolutionary computation, intelligent agents, neural networks, cellular automata, data mining, artificial immune systems and other similar biologically motivated computational models ...
The first paper discussed mathematical models of immunocomputing to simulate a natural immune system to perform the actions of intrusion detection system. ...
doi:10.1109/mci.2008.919066
fatcat:4ak2sn5jzjge5or5tw6ta63rjy
Theory and applications of artificial immune systems
2010
Neural computing & applications (Print)
The field has developed significantly over the recent years, with the development of solutions to a wide variety of problems ranging from document analysis, optimization, dynamic error detection, intrusion ...
detection, robot control and bioinformatics. ...
The field has developed significantly over the recent years, with the development of solutions to a wide variety of problems ranging from document analysis, optimization, dynamic error detection, intrusion ...
doi:10.1007/s00521-010-0388-2
fatcat:qmbakpljvrc75l5p3ehw2557t4
Computational Intelligence in Cyber Security
2006
2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety
The use of these techniques allowed building efficient and robust decision support modules, providing cross-linking solutions to different cyber security applications. ...
They typically include Fuzzy Logic, Evolutionary Computation, Intelligent Agent Systems, Neural Networks, Cellular Automata, Artificial Immune Systems and other similar computational models. ...
There exist a number of agent-based intrusion detection systems but do not include the features that found in nature. ...
doi:10.1109/cihsps.2006.313289
fatcat:t5wir63zwbedrdz2o5cmlwy6ei
An immunity-based technique to characterize intrusions in computer networks
2002
IEEE Transactions on Evolutionary Computation
The paper demonstrates the usefulness of such a technique to detect a wide variety of intrusive activities on networked computers. ...
Experiments are performed using intrusion detection data sets and tested for validation. Some results are reported along with analysis and concluding remarks. , TN. ...
There are multiple approaches to such anomaly detection [5] , [7] , [13] - [15] , [22] , [23] , [26] and most of them work by building a model or profile of the system that reflects its normal ...
doi:10.1109/tevc.2002.1011541
fatcat:skkebk4yp5a7philtjlsslug5q
Soft computing in intrusion detection: the state of the art
2010
Journal of Ambient Intelligence and Humanized Computing
The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as consecutive, ensemble, ...
Numerous comparisons of these methods are listed followed by a recommendation for future research. This paper can be used as a reference of strategies, and as a resource for planning future research. ...
Model-based intrusion detection is defined in this paper as being a scenario model at a higher level of abstraction then audit records. ...
doi:10.1007/s12652-010-0012-4
fatcat:itlsb2cjm5aybgb6b2a4mmc4o4
An Ecological Approach to Anomaly Detection: The EIA Model
[chapter]
2012
Lecture Notes in Computer Science
If conditions are appropriate, changes in the population (modeled by the bioindicators) are representative of the alterations to the environment. ...
This approach, based on an ecological view, improves functionally traditional approaches to the detection of anomalies. ...
One of the more complex scenarios is Network Intrusion Detection Systems (NIDS). ...
doi:10.1007/978-3-642-33757-4_18
fatcat:souzurex35hmhnopskqr2za2hy
Advances in artificial immune systems
2006
IEEE Computational Intelligence Magazine
The obvious limit of this type of Intrusion Detection Systems is its failure of detecting previously unknown intrusions. ...
The common trait of these problems is that the Intrusion Detection Systems can fail to detect an intrusion when an incomplete set of alerts comprising an intrusion scenario is reported. ...
doi:10.1109/mci.2006.329705
fatcat:ut3cdxzvuzcizfsy2ei6pecdqe
Artificial Immune Systems
[chapter]
2013
Encyclopedia of Systems Biology
The obvious limit of this type of intrusion detection systems is its failure in detecting previously unknown intrusions. ...
that the intrusion detection system can fail to detect an intrusion when an incomplete set of alerts comprising an intrusion scenario is reported. ...
doi:10.1007/978-1-4419-9863-7_100063
fatcat:uzoidos2yjfmtjqtjnr7fexpku
Artificial Immune Systems
[chapter]
2013
Search Methodologies
The obvious limit of this type of intrusion detection systems is its failure in detecting previously unknown intrusions. ...
that the intrusion detection system can fail to detect an intrusion when an incomplete set of alerts comprising an intrusion scenario is reported. ...
doi:10.1007/978-1-4614-6940-7_7
fatcat:4ty3a6rjdrbkdgo6rgcql3ahdq
Advances in artificial immune systems
2006
IEEE Computational Intelligence Magazine
The obvious limit of this type of Intrusion Detection Systems is its failure of detecting previously unknown intrusions. ...
The common trait of these problems is that the Intrusion Detection Systems can fail to detect an intrusion when an incomplete set of alerts comprising an intrusion scenario is reported. ...
doi:10.1109/ci-m.2006.248056
fatcat:g5czgsmucregpjqke3oszr3v4y
Artificial Immune Systems
[article]
2009
arXiv
pre-print
The innate immune system is an unchanging mechanism that detects and destroys certain invading organisms, whilst the adaptive immune system responds to previously unknown foreign cells and builds a response ...
There are two major branches of the immune system. ...
The obvious limit of this type of Intrusion Detection Systems is its failure of detecting previously unknown intrusions. ...
arXiv:0910.4899v1
fatcat:fczwrayqerbzfcg2wqzg25lhge
Artificial Immune Systems
[chapter]
2010
Decision Engineering
The obvious limit of this type of intrusion detection systems is its failure in detecting previously unknown intrusions. ...
that the intrusion detection system can fail to detect an intrusion when an incomplete set of alerts comprising an intrusion scenario is reported. ...
doi:10.1007/978-1-84996-129-5_9
fatcat:o52jzt3svfdyrnhezu65tiwdau
Artificial Immune Systems
[chapter]
2013
Encyclopedia of Sciences and Religions
The obvious limit of this type of intrusion detection systems is its failure in detecting previously unknown intrusions. ...
that the intrusion detection system can fail to detect an intrusion when an incomplete set of alerts comprising an intrusion scenario is reported. ...
doi:10.1007/978-1-4020-8265-8_1208
fatcat:ceyqhosi2bdljadae6oykkav2y
Artificial Immune Systems
[chapter]
2010
International Series in Operations Research and Management Science
The obvious limit of this type of intrusion detection systems is its failure in detecting previously unknown intrusions. ...
that the intrusion detection system can fail to detect an intrusion when an incomplete set of alerts comprising an intrusion scenario is reported. ...
doi:10.1007/978-1-4419-1665-5_14
fatcat:jkuvhn3eznh6neyl7naz4fp464
Artificial Immune Systems (INTROS 2)
[article]
2013
arXiv
pre-print
The innate immune system is an unchanging mechanism that detects and destroys certain invading organisms, whilst the adaptive immune system responds to previously unknown foreign cells and builds a response ...
There are two major branches of the immune system. ...
The obvious limit of this type of Intrusion Detection Systems is its failure of detecting previously unknown intrusions. ...
arXiv:1308.5138v1
fatcat:d7eo2qss5nbyvfocdfc4467fba
« Previous
Showing results 1 — 15 out of 24 results