Intelligent Dynamic Honeypot Enabled by Dynamic Fuzzy Rule Interpolation
暂无分享,去创建一个
Nitin Naik | Qiang Shen | Changjing Shang | Paul Jenkins | Q. Shen | N. Naik | Paul Jenkins | C. Shang
[1] Nitin Naik,et al. Enhancing Windows Firewall Security Using Fuzzy Reasoning , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).
[2] Hiok Chai Quek,et al. Backward Fuzzy Rule Interpolation , 2014, IEEE Transactions on Fuzzy Systems.
[3] Neil C. Rowe,et al. Measuring the Effectiveness of Honeypot Counter-Counterdeception , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[4] Nitin Naik,et al. Applying Computational Intelligence for enhancing the dependability of multi-cloud systems using Docker Swarm , 2016, 2016 IEEE Symposium Series on Computational Intelligence (SSCI).
[5] Gordon Fyodor Lyon,et al. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .
[6] Nitin Naik,et al. Fuzzy reasoning based Windows Firewall for preventing denial of service attack , 2016, 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[7] Jie Li,et al. An extended Takagi–Sugeno–Kang inference system (TSK+) with fuzzy interpolation and its rule base generation , 2018, Soft Comput..
[8] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[9] Nitin Naik,et al. Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots , 2018, 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[10] Anjali Sardana,et al. Honeypots: A New Paradigm to Information Security , 2011 .
[11] Qiang Shen,et al. Dynamic Fuzzy Rule Interpolation and Its Application to Intrusion Detection , 2018, IEEE Transactions on Fuzzy Systems.
[12] Nitin Naik,et al. Application of dynamic fuzzy rule interpolation for intrusion detection: D-FRI-Snort , 2016, 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[13] Nitin Naik,et al. Fuzzy Logic Aided Intelligent Threat Detection in Cisco Adaptive Security Appliance 5500 Series Firewalls , 2018, 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[14] Nitin Naik,et al. D-FRI-WinFirewall: Dynamic fuzzy rule interpolation for Windows Firewall , 2017, 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[15] Lloyd G. Greenwald,et al. Toward Undetected Operating System Fingerprinting , 2007, WOOT.
[16] Ebrahim H. Mamdani,et al. An Experiment in Linguistic Synthesis with a Fuzzy Logic Controller , 1999, Int. J. Hum. Comput. Stud..
[17] David Ball,et al. Augmented windows fuzzy firewall for preventing denial of service attack , 2017, 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[18] Qiang Shen,et al. Adaptive Fuzzy Interpolation , 2011, IEEE Transactions on Fuzzy Systems.
[19] Jie Li,et al. Towards sparse rule base generation for fuzzy rule interpolation , 2016, 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[20] Nitin Naik,et al. Genetic algorithm-aided dynamic fuzzy rule interpolation , 2014, 2014 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[21] N. Naik. Dynamic Fuzzy Rule Interpolation , 2015 .
[22] Fei Chao,et al. Generalized Adaptive Fuzzy Rule Interpolation , 2017, IEEE Transactions on Fuzzy Systems.
[23] Pan Su,et al. Integration of interpolation and inference , 2012, 2012 12th UK Workshop on Computational Intelligence (UKCI).
[24] Tossapon Boongoen,et al. Extending Data Reliability Measure to a Filter Approach for Soft Subspace Clustering , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[25] Nitin Naik,et al. Fuzzy Inference Based Intrusion Detection System: FI-Snort , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[26] Qiang Shen,et al. Fuzzy interpolative reasoning via scale and move transformations , 2006, IEEE Transactions on Fuzzy Systems.
[27] Nitin Naik,et al. A Fuzzy Approach for Detecting and Defending Against Spoofing Attacks on Low Interaction Honeypots , 2018, 2018 21st International Conference on Information Fusion (FUSION).
[28] Ying Li,et al. Fuzzy Rule Based Interpolative Reasoning Supported by Attribute Ranking , 2018, IEEE Transactions on Fuzzy Systems.
[29] Roger A. Grimes. Hacking the Hacker: Learn From the Experts Who Take Down Hackers , 2017 .
[30] Hiok Chai Quek,et al. Towards dynamic fuzzy rule interpolation , 2013, 2013 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[31] Vasilios Katos,et al. Big data security analysis approach using Computational Intelligence techniques in R for desktop users , 2016, 2016 IEEE Symposium Series on Computational Intelligence (SSCI).