Computer Systems Threat Evaluation: An Agent-based and Fuzzy Logic Intrusion Detection Architecture.
Essam M. HamedJames H. GrahamAdel Said ElmaghrabyPublished in: IS (2001)
Keyphrases
- computer systems
- intrusion detection
- intrusion detection system
- computer security
- fuzzy logic
- network security
- data processing
- anomaly detection
- network traffic
- operating system
- network intrusion detection
- computing systems
- distributed intrusion detection
- computer networks
- neural network
- information systems
- artificial immune
- data mining
- network intrusion
- high detection rate
- information security
- network intrusions
- communication systems
- alert correlation
- cyber security
- information processing systems
- detecting anomalous
- genetic algorithm
- cyber attacks
- artificial intelligence
- real world
- computational intelligence
- machine learning
- information retrieval
- control system