نتایج جستجو برای: fuzzy bayesian network
تعداد نتایج: 808595 فیلتر نتایج به سال:
Much has been written about the lack of transparency of computational intelligence models. This paper investigates the level of transparency of the Takagi-Sugeno neuro-fuzzy model and the Neural Network model by applying them to conflict management, an application which is concerned with causal interpretations of results. The neural network model is trained using the Bayesian framework. It is f...
ISSN 2250 – 110X | © 2011 Bonfring Abstract--The drawback of the anomaly based intrusion detection in a wireless network is the high rate of false positive. By designing a hybrid intrusion detection system can solve this by connecting a misuse detection module to the anomaly detection module. In this paper, we propose to develop a hybrid intrusion detection system for wireless local area networ...
In this paper we present a game-playing algorithm for the game of Nine Men’s Morris based on a small pattern database. The player is using a combination of game-specific heuristics and a pattern-based Bayesian network to make decisions about the next move. The Bayesian network is dynamically constructed and can be learned during the game play. The player we present uses a fuzzy logic approach a...
Data safekeeping and security has been a key concern in the rapidly growing computer systems and networks. One of the recent methods for identifying any abnormal activities staging in a computer system is carried out by Intrusion Detection Systems (IDS) and it forms a significant portion of system defence against attacks. Various methods based on Intrusion Detection Systems have been proposed i...
The exponential growth in wireless network faults, vulnerabilities, and attacks make the WLAN security management a challenging research area [29]. Data mining applied to intrusion detection is an active area of research. The main reason for using data mining techniques for intrusion detection systems is due to the enormous volume of existing and newly appearing network data that require proces...
With the enormous growth of computer networks and the huge increase in the number of applications that rely on it, network security is gaining increasing importance. Moreover, almost all computer systems suffer from security vulnerabilities which are both technically difficult and economically costly to be solved by the manufacturers. Therefore, the role of Intrusion Detection Systems (IDSs), a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید