Abstract: To address the issue in fuzzy C-means algorithm (FCM) that clustering number has to be pre-defined, a clustering algorithm, F-CMSVM (fuzzy C-means and support vector machine algorithm), is proposed for automatic clustering number determination. Above all, the data set is classified into two clusters by FCM. Then, support vector machine (SVM) with a fuzzy membership function is used to testify whether the data set can be classified further. Finally, the result of clusters can be obtained by repeating the computation process. Because affiliating matrix, obtained by the introduction of SVM into FCM, is defined to be the fuzzy membership function, each different input data sample can have different penalty value, and the separating h...
In order to solve the problem of virus and Trojan attacking the application layer network protocol o...
Fuzzy C-Means (FCM) is a data clustering technique where the existence of each data point in a clust...
IDS is a procedure of observing the events happening in a computer system or network and analyzing t...
In this paper, we introduce a new clustering algorithm, FCC, for intrusion detection based on the co...
This paper presents a network anomaly detection method based on fuzzy clustering. Computer security ...
With the rapid rise of technology, many unusual and unwanted patterns have been observed in the comm...
The problem of attacks on various networks and information systems is increasing. And with systems w...
As computer technology continues to develop, computer networks are now widely used. As a result, the...
Intrusion Detection Systems (IDS) is special software developed in order to protect the system again...
Internet is playing a important role in modern lifestyle. On the other hand, it brings the problem o...
Abstract: Cluster analysis is used for clustering a data set into groups of similar individuals. It ...
Maximizing detection accuracy and minimizing the false alarm rate are two major challenges in the de...
Abstract. The need to increase accuracy in detecting sophisticated cyber attacks poses a great chall...
International audienceThe need to increase accuracy in detecting sophisticated cyber attacks poses a...
Real-time network traffic anomaly detection is crucial for the confidentiality, integrity, and secur...
In order to solve the problem of virus and Trojan attacking the application layer network protocol o...
Fuzzy C-Means (FCM) is a data clustering technique where the existence of each data point in a clust...
IDS is a procedure of observing the events happening in a computer system or network and analyzing t...
In this paper, we introduce a new clustering algorithm, FCC, for intrusion detection based on the co...
This paper presents a network anomaly detection method based on fuzzy clustering. Computer security ...
With the rapid rise of technology, many unusual and unwanted patterns have been observed in the comm...
The problem of attacks on various networks and information systems is increasing. And with systems w...
As computer technology continues to develop, computer networks are now widely used. As a result, the...
Intrusion Detection Systems (IDS) is special software developed in order to protect the system again...
Internet is playing a important role in modern lifestyle. On the other hand, it brings the problem o...
Abstract: Cluster analysis is used for clustering a data set into groups of similar individuals. It ...
Maximizing detection accuracy and minimizing the false alarm rate are two major challenges in the de...
Abstract. The need to increase accuracy in detecting sophisticated cyber attacks poses a great chall...
International audienceThe need to increase accuracy in detecting sophisticated cyber attacks poses a...
Real-time network traffic anomaly detection is crucial for the confidentiality, integrity, and secur...
In order to solve the problem of virus and Trojan attacking the application layer network protocol o...
Fuzzy C-Means (FCM) is a data clustering technique where the existence of each data point in a clust...
IDS is a procedure of observing the events happening in a computer system or network and analyzing t...