Visual data mining techniques are used to assess which metrics are most effective at detecting different types of attacks. The research confirms that data aggregation and data reduction play crucial roles in the formation of the metrics. Once the proper metrics are identified, fuzzy rules are constructed for detecting attacks in several categories. The attack categories are selected to match the different phases that intruders frequently use when attacking a system. A suite of attacks tools is assembled to test the fuzzy rules. The research shows that fuzzy rules applied to good metrics can provide an effective means of detecting a wide variety of network intrusion activity. This research is being used as a proof of concept for the developm...
The growing importance of mobile telephones, especially so called smartphones , the problem of iden...
In the age of the Internet of Things (IoT), every motion in our daily life can be captured and modul...
Whether used as a tool to enhance a traditional classroom, or as the delivery mechanism for Web-base...
Intrusion Detection is a broad and complex field in cybersecurity. There are varieties of existing m...
Using compromised or malicious sites to launch attacks against client systems is a growing attack ve...
The 2018 Verizon Data Breach Investigation report indicates that over 90% of common breaches start w...
Intrusion detection systems have been widely used as burglar alarms in the computer security field...
Crimes committed over computer networks has increased dramatically over the past few years. From the...
The fast-fluxing has been used by attackers to increase the availability of malicious domains and th...
Surface terrain information is required to economically site new or relocate existing infrastructure...
Neuro-fuzzy systems combine the theory of two popular computational intelligence techniques: neural ...
With an ever increasing number of attacks on networks that have an even more increasing amount of in...
There are many multiple-model (MM) target-tracking algorithms that are available but there has yet ...
The transition from the operating room to the postoperative care unit is a critical time in the peri...
Falling weight deflectometer (FWD) and ground penetrating radar (GPR) are nondestructive test device...
The growing importance of mobile telephones, especially so called smartphones , the problem of iden...
In the age of the Internet of Things (IoT), every motion in our daily life can be captured and modul...
Whether used as a tool to enhance a traditional classroom, or as the delivery mechanism for Web-base...
Intrusion Detection is a broad and complex field in cybersecurity. There are varieties of existing m...
Using compromised or malicious sites to launch attacks against client systems is a growing attack ve...
The 2018 Verizon Data Breach Investigation report indicates that over 90% of common breaches start w...
Intrusion detection systems have been widely used as burglar alarms in the computer security field...
Crimes committed over computer networks has increased dramatically over the past few years. From the...
The fast-fluxing has been used by attackers to increase the availability of malicious domains and th...
Surface terrain information is required to economically site new or relocate existing infrastructure...
Neuro-fuzzy systems combine the theory of two popular computational intelligence techniques: neural ...
With an ever increasing number of attacks on networks that have an even more increasing amount of in...
There are many multiple-model (MM) target-tracking algorithms that are available but there has yet ...
The transition from the operating room to the postoperative care unit is a critical time in the peri...
Falling weight deflectometer (FWD) and ground penetrating radar (GPR) are nondestructive test device...
The growing importance of mobile telephones, especially so called smartphones , the problem of iden...
In the age of the Internet of Things (IoT), every motion in our daily life can be captured and modul...
Whether used as a tool to enhance a traditional classroom, or as the delivery mechanism for Web-base...