An Intelligent Hybrid Model for the Construction of Expert Systems in Malware Detection
暂无分享,去创建一个
Lucas Oliveira Batista | Thiago Silva Rezende | Paulo Vitor de Campos Souza | Augusto Junio Guimarães | Vanessa Souza Araujo | Luiz Antônio F. do Nascimento
[1] Mustaffa Zuriani,et al. Anomaly Detection in Time Series Data Using Spiking Neural Network , 2018 .
[2] Michael Benedikt,et al. Cyberspace: First Steps , 1991 .
[3] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[4] Wenke Lee,et al. McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[5] Ali A. Ghorbani,et al. Detecting Malicious URLs Using Lexical Analysis , 2016, NSS.
[6] Paulo Vitor de Campos Souza,et al. Regularized Fuzzy Neural Network Based on Or Neuron for Time Series Forecasting , 2018, NAFIPS.
[7] Sonia Chiasson,et al. Technological and Human Factors of Malware Attacks , 2018, ACM Trans. Priv. Secur..
[8] Jyh-Shing Roger Jang,et al. ANFIS: adaptive-network-based fuzzy inference system , 1993, IEEE Trans. Syst. Man Cybern..
[9] Witold Pedrycz,et al. Neurocomputations in Relational Systems , 1991, IEEE Trans. Pattern Anal. Mach. Intell..
[10] Lucas Oliveira Batista,et al. Fuzzy neural networks to create an expert system for detecting attacks by SQL Injection , 2018, The International Journal of Forensic Computer Science.
[11] Paulo Vitor de Campos Souza,et al. Using fuzzy neural networks for improving the prediction of children with autism through mobile devices. , 2018, 2018 IEEE Symposium on Computers and Communications (ISCC).
[12] Fernando Gomide,et al. New uninorm-based neuron model and fuzzy neural networks , 2010, 2010 Annual Meeting of the North American Fuzzy Information Processing Society.
[13] Konstantinos Demertzis,et al. A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security , 2015 .
[14] Alexandre Gazet,et al. Comparative analysis of various ransomware virii , 2010, Journal in Computer Virology.
[15] Chee Kheong Siew,et al. Extreme learning machine: Theory and applications , 2006, Neurocomputing.
[16] Francis R. Bach,et al. Bolasso: model consistent Lasso estimation through the bootstrap , 2008, ICML '08.
[17] Kang G. Shin,et al. Large-scale malware indexing using function-call graphs , 2009, CCS.
[18] Thiago Silva Rezende,et al. Using Fuzzy Neural Networks Regularized to Support Software for Predicting Autism in Adolescents on Mobile Devices , 2019 .
[19] Lucas Oliveira Batista,et al. Utilização de Redes Neurais Nebulosas para criação de um Sistema Especialista em Invasões Cibernéticas , 2018, ICoFCS-2018.
[20] Konstantinos Demertzis,et al. Evolving Computational Intelligence System for Malware Detection , 2014, CAiSE Workshops.
[21] Paulo Vitor de Campos Souza,et al. Pruning fuzzy neural networks based on unineuron for problems of classification of patterns , 2018, J. Intell. Fuzzy Syst..
[22] J. Bezdek,et al. FCM: The fuzzy c-means clustering algorithm , 1984 .
[23] F. Gomide,et al. A fast learning algorithm for uninorm-based fuzzy neural networks , 2012, 2012 Annual Meeting of the North American Fuzzy Information Processing Society (NAFIPS).
[24] Lucas Oliveira Batista,et al. Evolving fuzzy neural networks to aid in the construction of systems specialists in cyber attacks , 2019, J. Intell. Fuzzy Syst..
[25] Paulo Vitor de Campos Souza,et al. Uninorm based regularized fuzzy neural networks , 2018, 2018 IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS).
[26] D Vasumathi,et al. Review on anomaly based network intrusion detection system , 2017, 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT).
[27] Lucas Oliveira Batista,et al. A Hybrid Model Based on Fuzzy Rules to Act on the Diagnosed of Autism in Adults , 2019, AIAI.
[28] Konstantinos Demertzis,et al. A Computational Intelligence System Identifying Cyber-Attacks on Smart Energy Grids , 2018 .
[29] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.