Building a cognizant honeypot for detecting active fingerprinting attacks using dynamic fuzzy rule interpolation
暂无分享,去创建一个
Nitin Naik | Qiang Shen | Changjing Shang | Paul Jenkins | Q. Shen | N. Naik | Paul Jenkins | C. Shang
[1] Jie Li,et al. Towards sparse rule base generation for fuzzy rule interpolation , 2016, 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[2] Nitin Naik,et al. D-FRI-WinFirewall: Dynamic fuzzy rule interpolation for Windows Firewall , 2017, 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[3] Gordon Fyodor Lyon,et al. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .
[4] Ying Li,et al. Fuzzy Rule Based Interpolative Reasoning Supported by Attribute Ranking , 2018, IEEE Transactions on Fuzzy Systems.
[5] Nitin Naik,et al. Genetic algorithm-aided dynamic fuzzy rule interpolation , 2014, 2014 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[6] Tossapon Boongoen,et al. Extending Data Reliability Measure to a Filter Approach for Soft Subspace Clustering , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[7] Nitin Naik,et al. Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots , 2018, 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[8] Qiang Shen,et al. Fuzzy interpolative reasoning via scale and move transformations , 2006, IEEE Transactions on Fuzzy Systems.
[9] Nitin Naik,et al. Discovering Hackers by Stealth: Predicting Fingerprinting Attacks on Honeypot Systems , 2018, 2018 IEEE International Systems Engineering Symposium (ISSE).
[10] Nitin Naik,et al. A Fuzzy Approach for Detecting and Defending Against Spoofing Attacks on Low Interaction Honeypots , 2018, 2018 21st International Conference on Information Fusion (FUSION).
[11] Nitin Naik,et al. Intelligent Dynamic Honeypot Enabled by Dynamic Fuzzy Rule Interpolation , 2018, 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
[12] Fei Chao,et al. Generalized Adaptive Fuzzy Rule Interpolation , 2017, IEEE Transactions on Fuzzy Systems.
[13] Qiang Shen,et al. Dynamic Fuzzy Rule Interpolation and Its Application to Intrusion Detection , 2018, IEEE Transactions on Fuzzy Systems.
[14] Pan Su,et al. Aberystwyth University Induction of accurate and interpretable fuzzy rules from preliminary crisp representation , 2018 .
[15] Lloyd G. Greenwald,et al. Toward Undetected Operating System Fingerprinting , 2007, WOOT.
[16] Nitin Naik,et al. Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation , 2018, 2018 IEEE Symposium Series on Computational Intelligence (SSCI).
[17] Qiang Shen,et al. Nature inspired feature selection meta-heuristics , 2015, Artificial Intelligence Review.
[18] Nitin Naik,et al. Application of dynamic fuzzy rule interpolation for intrusion detection: D-FRI-Snort , 2016, 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[19] Tossapon Boongoen,et al. Disclosing false identity through hybrid link analysis , 2010, Artificial Intelligence and Law.
[20] Neil C. Rowe,et al. Measuring the Effectiveness of Honeypot Counter-Counterdeception , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[21] Nitin Naik,et al. Threat-Aware Honeypot for Discovering and Predicting Fingerprinting Attacks Using Principal Components Analysis , 2018, 2018 IEEE Symposium Series on Computational Intelligence (SSCI).
[22] Qiang Shen,et al. New Approaches to Fuzzy-Rough Feature Selection , 2009, IEEE Transactions on Fuzzy Systems.
[23] Jie Li,et al. An extended Takagi–Sugeno–Kang inference system (TSK+) with fuzzy interpolation and its rule base generation , 2018, Soft Comput..