An Efficient Fuzzy-Based Hybrid System to Cloud Intrusion Detection
暂无分享,去创建一个
[1] Hiroyuki Watanabe,et al. Application of a fuzzy discrimination analysis for diagnosis of valvular heart disease , 1994, IEEE Trans. Fuzzy Syst..
[2] Fabrizio Baiardi,et al. CIDD: A Cloud Intrusion Detection Dataset for Cloud Computing and Masquerade Attacks , 2012, 2012 Ninth International Conference on Information Technology - New Generations.
[3] T. Martin McGinnity,et al. Design for Self-Organizing Fuzzy Neural Networks Based on Genetic Algorithms , 2006, IEEE Transactions on Fuzzy Systems.
[4] Sam Kwong,et al. Anomaly intrusion detection using multi-objective genetic fuzzy system and agent-based evolutionary computation framework , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[5] Sudhir N. Dhage,et al. Intrusion detection system in cloud computing environment , 2011, ICWET.
[6] Md. Abu Naser Bikas,et al. An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.
[7] Ching-Chang Wong,et al. A hybrid clustering and gradient descent approach for fuzzy modeling , 1999, IEEE Trans. Syst. Man Cybern. Part B.
[8] Hai Jin,et al. A VMM-based intrusion prevention system in cloud computing environment , 2013, The Journal of Supercomputing.
[9] Shigeo Abe,et al. Function approximation based on fuzzy rules extracted from partitioned numerical data , 1999, IEEE Trans. Syst. Man Cybern. Part B.
[10] Teuvo Kohonen,et al. Self-Organizing Maps , 2010 .
[11] Antonio González Muñoz,et al. Multi-stage genetic fuzzy systems based on the iterative rule learning approach , 1997 .
[12] Ajith Abraham,et al. Intrusion Detection Using Ensemble of Soft Computing Paradigms , 2003 .
[13] James C. Bezdek,et al. Pattern Recognition with Fuzzy Objective Function Algorithms , 1981, Advanced Applications in Pattern Recognition.
[14] Vijay Varadharajan,et al. Intrusion Detection Techniques for Infrastructure as a Service Cloud , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.
[15] Carla Merkle Westphall,et al. Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.
[16] D.M. Mount,et al. An Efficient k-Means Clustering Algorithm: Analysis and Implementation , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[17] Chia-Feng Juang,et al. A Self-Evolving Interval Type-2 Fuzzy Neural Network With Online Structure and Parameter Learning , 2008, IEEE Transactions on Fuzzy Systems.
[18] Sabyasachi Patra,et al. Machine Learning Approach for Intrusion Detection on Cloud Virtual Machines , 2013 .
[19] I. Burhan Türksen,et al. Discrete Interval Type 2 Fuzzy System Models Using Uncertainty in Learning Parameters , 2007, IEEE Transactions on Fuzzy Systems.
[20] Jerry M. Mendel,et al. Centroid of a type-2 fuzzy set , 2001, Inf. Sci..
[21] Lotfi A. Zadeh,et al. The concept of a linguistic variable and its application to approximate reasoning-III , 1975, Inf. Sci..
[22] Ebrahim H. Mamdani,et al. An Experiment in Linguistic Synthesis with a Fuzzy Logic Controller , 1999, Int. J. Hum. Comput. Stud..
[23] Syuan-Yi Chen,et al. Robust Control of an LUSM-Based Xhbox-Yhbox-theta Motion Control Stage Using an Adaptive Interval Type-2 Fuzzy Neural Network , 2009, IEEE Trans. Fuzzy Syst..
[24] Yinghua Lin,et al. Using fuzzy partitions to create fuzzy systems from input-output data and set the initial weights in a fuzzy neural network , 1997, IEEE Trans. Fuzzy Syst..
[25] Chien-Hsing Chou,et al. Short Papers , 2001 .
[26] Oscar Castillo,et al. A hybrid learning algorithm for a class of interval type-2 fuzzy neural networks , 2009, Inf. Sci..
[27] Hussein A. Abbass,et al. An adaptive genetic-based signature learning system for intrusion detection , 2009, Expert Syst. Appl..
[28] Hossein Shirazi,et al. An Intelligent Intrusion Detection System Using Genetic Algorithms and Features Selection , 2010 .
[29] Dimitar Filev,et al. Generation of Fuzzy Rules by Mountain Clustering , 1994, J. Intell. Fuzzy Syst..
[30] Mostaque Md. Morshedur Hassan. Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic , 2013, ArXiv.
[31] Russell C. Eberhart,et al. Implementation of evolutionary fuzzy systems , 1999, IEEE Trans. Fuzzy Syst..
[32] Dijiang Huang,et al. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems , 2013, IEEE Transactions on Dependable and Secure Computing.
[33] Stephen L. Chiu,et al. Fuzzy Model Identification Based on Cluster Estimation , 1994, J. Intell. Fuzzy Syst..
[34] M. Rajalakshmi,et al. An Intelligent Genetic Algorithm for Mining Classification Rules in Large Datasets , 2013, Comput. Informatics.
[35] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[36] Germano Lambert-Torres,et al. A genetic-based neuro-fuzzy approach for modeling and control of dynamical systems , 1998, IEEE Trans. Neural Networks.
[37] Aboul Ella Hassanien,et al. Artificial Immune System Inspired Intrusion Detection System Using Genetic Algorithm , 2012, Informatica.