Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence.
D. Shalini PunithavathaniK. SujathaJ. Mark JainPublished in: Clust. Comput. (2015)
Keyphrases
- computational intelligence
- anomaly detection
- countermeasures
- fuzzy logic
- social networks
- intelligent systems
- insider threat
- network structure
- intrusion detection
- web applications
- fuzzy sets
- evolutionary computation
- network analysis
- engineering systems
- access control
- power system
- artificial neural networks
- complex networks
- intrusion detection system
- information security
- surveillance system
- computer vision
- cyber security
- real time