[[abstract]]Expert system technology becomes more and more important for next generation computer systems. A rule base is a widely used approach to construct an expert system, where knowledge and expertise are represented as production rules. However, due to the growth of rule base usage, the scale of rule base is increasing and hence many management related issues arise. By considering not only the structural relatedness between rules but also the semantic relatedness of rules, RP-MES is proposed combining both rule base partitioning mechanism and meta-rule construction mechanism to solve these issues in this paper. An Intrusion Detection prototype System is also designed and implemented based on RP-MES, and some experiments have been done...
AbstractLearning by an exchange of knowledge and experiences enables humans to act efficiently in a ...
Abstract—Intrusion Detection Systems (IDSs) are designed to monitor network traffic and computer act...
In this paper, a method of extracting rules with immune algorithms from information systems is propo...
Abstract. This paper presents new inference algorithms based on rules partition. Optimisation relies...
The continuously rising Internet attacks pose severe challenges to develop an effective Intrusion De...
This paper details an essential component of a multi-agent distributed knowledge network system for ...
Rule-based expert systems (RBES) use knowledge about a specific topic, represented as rules, in orde...
Intrusion detection has been an issue since the beginning of computer network technology in the 1980...
High-performance rule processing systems are needed by network administrators in order to protect In...
Many computational intelligence techniques for anomaly based network intrusion detection can be foun...
The work represented here utilizes evolutionary computation to improve intrusion detection technique...
Rule-Based Systems (RBS) are computer programs based on technologies established by Artificial Intel...
In this paper we test a hypothesis that has shown promise in enhancing the efficiency (run-time) of ...
This article deals with how metaknowledge can improve rule-based system and presents a new Reflexive...
Current expert systems are typically difficult to change once they are built. The authors introduce ...
AbstractLearning by an exchange of knowledge and experiences enables humans to act efficiently in a ...
Abstract—Intrusion Detection Systems (IDSs) are designed to monitor network traffic and computer act...
In this paper, a method of extracting rules with immune algorithms from information systems is propo...
Abstract. This paper presents new inference algorithms based on rules partition. Optimisation relies...
The continuously rising Internet attacks pose severe challenges to develop an effective Intrusion De...
This paper details an essential component of a multi-agent distributed knowledge network system for ...
Rule-based expert systems (RBES) use knowledge about a specific topic, represented as rules, in orde...
Intrusion detection has been an issue since the beginning of computer network technology in the 1980...
High-performance rule processing systems are needed by network administrators in order to protect In...
Many computational intelligence techniques for anomaly based network intrusion detection can be foun...
The work represented here utilizes evolutionary computation to improve intrusion detection technique...
Rule-Based Systems (RBS) are computer programs based on technologies established by Artificial Intel...
In this paper we test a hypothesis that has shown promise in enhancing the efficiency (run-time) of ...
This article deals with how metaknowledge can improve rule-based system and presents a new Reflexive...
Current expert systems are typically difficult to change once they are built. The authors introduce ...
AbstractLearning by an exchange of knowledge and experiences enables humans to act efficiently in a ...
Abstract—Intrusion Detection Systems (IDSs) are designed to monitor network traffic and computer act...
In this paper, a method of extracting rules with immune algorithms from information systems is propo...