ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Fuzzy Logic based Network Intrusion Detection Systems
2020 IEEE 18th World Symposium on Applied Machine Intelligence and Informatics (SAMI)
◽
10.1109/sami48414.2020.9108750
◽
2020
◽
Author(s):
Zsolt Csaba Johanyak
Keyword(s):
Fuzzy Logic
◽
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Related Documents
Cited By
References
IMPROVING TRAINING OF NEURAL NETWORK INTRUSION DETECTION SYSTEMS USING FUZZY LOGIC
Issues In Information Systems
◽
10.48009/2_iis_2020_178-185
◽
2020
◽
Keyword(s):
Neural Network
◽
Fuzzy Logic
◽
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
An Approach to Reduce Uncertainty Problem in Network Intrusion Detection Systems
2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS)
◽
10.1109/iciis51140.2020.9342634
◽
2020
◽
Author(s):
Gargi Kadam
◽
Sahil Parekh
◽
Priyanka Agnihotri
◽
Dayanand Ambawade
◽
Prasenjit Bhavathankar
Keyword(s):
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Predicting the resource consumption of network intrusion detection systems
Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems - SIGMETRICS '08
◽
10.1145/1375457.1375509
◽
2008
◽
Cited By ~ 7
Author(s):
Holger Dreger
◽
Anja Feldmann
◽
Vern Paxson
◽
Robin Sommer
Keyword(s):
Intrusion Detection
◽
Resource Consumption
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
A Flexible Pattern-Matching Algorithm for Network Intrusion Detection Systems Using Multi-Core Processors
Algorithms
◽
10.3390/a10020058
◽
2017
◽
Vol 10
(2)
◽
pp. 58
◽
Cited By ~ 1
Author(s):
◽
Keyword(s):
Intrusion Detection
◽
Pattern Matching
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Matching Algorithm
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
◽
Pattern Matching Algorithm
Download Full-text
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems
2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)
◽
10.1109/nfv-sdn50289.2020.9289869
◽
2020
◽
Author(s):
Mohammad J. Hashemi
◽
Eric Keller
Keyword(s):
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
◽
Adversarial Examples
Download Full-text
On Handling Class Imbalance in Continual Learning based Network Intrusion Detection Systems
10.1145/3486001.3486231
◽
2021
◽
Author(s):
Suresh Kumar Amalapuram
◽
Thushara Tippi Reddy
◽
Sumohana S. Channappayya
◽
Bheemarjuna Reddy Tamma
Keyword(s):
Intrusion Detection
◽
Class Imbalance
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
◽
Continual Learning
Download Full-text
Fast and Scalable Pattern Matching for Network Intrusion Detection Systems
IEEE Journal on Selected Areas in Communications
◽
10.1109/jsac.2006.877131
◽
2006
◽
Vol 24
(10)
◽
pp. 1781-1792
◽
Cited By ~ 99
Author(s):
S. Dharmapurikar
◽
J.W. Lockwood
Keyword(s):
Intrusion Detection
◽
Pattern Matching
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Effect of Activation Functions on the Performance of Deep Learning Algorithms for Network Intrusion Detection Systems
Proceedings of ICETIT 2019 - Lecture Notes in Electrical Engineering
◽
10.1007/978-3-030-30577-2_84
◽
2019
◽
pp. 949-960
Author(s):
Neha Gupta
◽
Punam Bedi
◽
Vinita Jindal
Keyword(s):
Deep Learning
◽
Intrusion Detection
◽
Learning Algorithms
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Activation Functions
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Generating realistic workloads for network intrusion detection systems
ACM SIGSOFT Software Engineering Notes
◽
10.1145/974043.974078
◽
2004
◽
Vol 29
(1)
◽
pp. 207-215
◽
Cited By ~ 25
Author(s):
Spyros Antonatos
◽
Kostas G. Anagnostakis
◽
Evangelos P. Markatos
Keyword(s):
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
An evaluation technique for network intrusion detection systems
Proceedings of the 1st international conference on Scalable information systems - InfoScale '06
◽
10.1145/1146847.1146870
◽
2006
◽
Cited By ~ 5
Author(s):
Dana Zhang
◽
Christopher Leckie
Keyword(s):
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Evaluation Technique
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close