Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
This paper presents a comprehensive investigation of the fuzzy misuse detection schemes designed using various machine learning and data mining techniques
This paper presents a comprehensive investigation of the fuzzy misuse detection schemes designed using various machine learning and data mining techniques
For this purpose, it first presents the key points and knowledge about intrusion detection and then classifies the fuzzy misuse detection approaches regarding ...
People also ask
A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems. Mohammad Masdari, Hemn Khezri. A survey and taxonomy of the fuzzy signature ...
This paper presents a taxonomy of intrusion detection systems that is then used to survey and classify a number of research prototypes.
Jul 17, 2019 · This survey paper presents a taxonomy of contemporary IDS, a comprehensive review of notable recent works, and an overview of the datasets commonly used for ...
Mar 14, 2000 · Abstract. This paper presents a taxonomy of intrusion detection systems that is then used to survey and classify a number of research ...
Jun 9, 2018 · based (4.2.1) IDS are based on prior threat detection and the creation of accurate signatures. ... A Survey of Intrusion Detection Systems in ...
Masdari M., Khezri H, A survey and taxonomy of the fuzzy signature-based intrusion detection systems, Applied Soft Computing (2020) 106301. Google Scholar.
A taxonomy of contemporary IDS is presented, a comprehensive review of notable recent works, and an overview of the datasets commonly used for evaluation ...