Integration Soft Computing Approach to Network Security.
Surat SrinoyPublished in: Asia International Conference on Modelling and Simulation (2007)
Keyphrases
- soft computing
- network security
- fuzzy logic
- computational intelligence
- intrusion detection
- intrusion detection system
- traffic analysis
- intelligent systems
- computer networks
- network traffic
- evolutionary computation
- rough sets
- information fusion
- soft computing methods
- information security
- anomaly detection
- hybrid intelligent systems
- data mining
- neural network
- artificial neural networks
- risk assessment
- dos attacks
- situation assessment
- power plant
- anti phishing
- fuzzy sets
- security breaches
- security protection
- data warehouse
- evolutionary algorithm
- network monitoring
- machine learning
- network administrators
- databases