Keyphrases
- soft computing
- anomaly detection
- fuzzy logic
- computational intelligence
- intrusion detection
- intelligent systems
- network intrusion detection
- soft computing methods
- anomalous behavior
- fuzzy systems
- detecting anomalies
- rough sets
- artificial neural networks
- network traffic
- fuzzy sets
- neural network
- data mining
- evolutionary computation
- hybrid intelligent systems
- intrusion detection system
- methodological aspects
- artificial intelligence
- detect anomalies
- one class support vector machines
- unsupervised learning
- cumulative sum
- probabilistic model
- active learning
- machine learning
- real world
- real time