Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Results of an experimental study of an anomaly detection system based on the paradigm of artificial immune systems (AISs) are presented. Network traffic data are mapped into ant...
A major difficulty for anomaly detection lies in discovering boundaries between normal and anomalous behavior, due to the deficiency of abnormal samples in the training phase. In...
Abstract. In the last years, several papers have proposed to adopt multiobjective evolutionary algorithms (MOEAs) to generate Mamdani fuzzy rulebased systems with different trade-o...
Michela Antonelli, Pietro Ducange, Beatrice Lazzer...
Abstract. In knowledge representation by fuzzy rule based systems two reasoning mechanisms can be distinguished: conjunction-based and implication-based inference. Both approaches ...
Mark Freischlad, Martina Schnellenbach-Held, Torbe...