SAIRF: A similarity approach for attack intention recognition using fuzzy min-max neural network
暂无分享,去创建一个
[1] Jun Wang,et al. A primal-dual neural network for online resolving constrained kinematic redundancy in robot motion control , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[2] Abdulghani Ali. Investigation Approach for Network Attack Intention Recognition , 2017, Int. J. Digit. Crime Forensics.
[3] Abdulghani Ali Ahmed. Investigation Approach for Network Attack Intention Recognition , 2020, Digital Forensics and Forensic Investigations.
[4] Zhiyong Zhang,et al. A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory , 2017, J. Comput. Sci..
[5] Patrick K. Simpson,et al. Fuzzy min-max neural networks. I. Classification , 1992, IEEE Trans. Neural Networks.
[6] B. Efron. Bootstrap Methods: Another Look at the Jackknife , 1979 .
[7] Chee Peng Lim,et al. An Enhanced Fuzzy Min–Max Neural Network for Pattern Classification , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[8] Aman Jantan,et al. AIA: Attack Intention Analysis Algorithm Based on D-S Theory with Causal Technique for Network Forensics - A Case Study , 2011 .
[9] Arpan Kumar Kar,et al. A hybrid group decision support system for supplier selection using analytic hierarchy process, fuzzy set theory and neural network , 2015, J. Comput. Sci..
[10] Qingtao Wu,et al. Intrusion Intention Identification Methods Based on Dynamic Bayesian Networks , 2011 .
[11] Junhua Chen,et al. Recognizing Intrusive Intention and Assessing Threat Based on Attack Path Analysis , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[12] Ali Safa Sadiq,et al. Traceback model for identifying sources of distributed attacks in real time , 2016, Secur. Commun. Networks.
[13] Aman Jantan,et al. A New Algorithm to Estimate the Similarity between the Intentions of the Cyber Crimes for Network Forensics , 2013 .
[14] Abdulghani Ali Ahmed,et al. Analyzing Data Remnant Remains on User Devices to Determine Probative Artifacts in Cloud Environment , 2018, Journal of forensic sciences.
[15] Mazin Abed Mohammed,et al. Artificial neural networks for automatic segmentation and identification of nasopharyngeal carcinoma , 2017, J. Comput. Sci..
[16] S. S. Vinod Chandra,et al. Graft survival prediction in liver transplantation using artificial neural network models , 2016, J. Comput. Sci..
[17] Aman Jantan,et al. Filtration model for the detection of malicious traffic in large-scale networks , 2016, Comput. Commun..
[18] Dr.Irshad Ahmed Sumra,et al. Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET: A Survey , 2015 .
[19] Wenke Lee,et al. Attack plan recognition and prediction using causal networks , 2004, 20th Annual Computer Security Applications Conference.
[20] Nor Ashidi Mat Isa,et al. Feature-Based Ordering Algorithm for Data Presentation of Fuzzy ARTMAP Ensembles , 2014, IEEE Transactions on Neural Networks and Learning Systems.
[21] Igor Kotenko,et al. Hybridization of computational intelligence methods for attack detection in computer networks , 2017, J. Comput. Sci..
[22] Junhua Chen,et al. Research on Attack Intention Recognition Based on Graphical Model , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[23] Abdulghani Ali,et al. Attack Intention Recognition: A Review , 2017, Int. J. Netw. Secur..
[24] Chee Peng Lim,et al. Applying a multi-agent classifier system with a novel trust measurement method to classifying medical data , 2014 .
[25] Debasish Biswas,et al. Soil Classification From Large Imagery Databases Using a Neuro-Fuzzy Classifier , 2016, Canadian Journal of Electrical and Computer Engineering.