Using Neural Network to Propose Solutions to Threats in Attack Patterns.
Adetunji B. AdebiyiChris ImafidonPublished in: CoRR (2014)
Keyphrases
- neural network
- countermeasures
- training patterns
- denial of service attacks
- buffer overflow
- malicious attacks
- neural network model
- pattern recognition
- cyber attacks
- pattern mining
- sequential patterns
- bp neural network
- attack scenarios
- intrusion detection
- data mining techniques
- fuzzy logic
- security measures
- knn
- security vulnerabilities
- artificial neural networks