Autonomous learning for fuzzy systems: a review

X Gu, J Han, Q Shen, PP Angelov - Artificial Intelligence Review, 2023 - Springer
As one of the three pillars in computational intelligence, fuzzy systems are a powerful
mathematical tool widely used for modelling nonlinear problems with uncertainties. Fuzzy …

Intrusion detection systems: A cross-domain overview

LN Tidjon, M Frappier… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Nowadays, network technologies are essential for transferring and storing various
information of users, companies, and industries. However, the growth of the information …

A review of rule learning-based intrusion detection systems and their prospects in smart grids

Q Liu, V Hagenmeyer, HB Keller - Ieee Access, 2021 - ieeexplore.ieee.org
Intrusion detection systems (IDS) are commonly categorized into misuse based, anomaly
based and specification based IDS. Both misuse based IDS and anomaly based IDS are …

The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review

B Naik, A Mehta, H Yagnik, M Shah - Complex & Intelligent Systems, 2022 - Springer
Given the prevailing state of cybersecurity, it is reasonable to understand why cybersecurity
experts are seriously considering artificial intelligence as a potential field that can aid …

A secure and privacy-preserving e-government framework using blockchain and artificial immunity

N Elisa, L Yang, F Chao, N Naik, T Boongoen - IEEE Access, 2023 - ieeexplore.ieee.org
Electronic Government (e-Government) systems constantly provide greater services to
people, businesses, organisations, and societies by offering more information, opportunities …

Approximate reasoning with fuzzy rule interpolation: background and recent advances

F Li, C Shang, Y Li, J Yang, Q Shen - Artificial Intelligence Review, 2021 - Springer
Approximate reasoning systems facilitate fuzzy inference through activating fuzzy if–then
rules in which attribute values are imprecisely described. Fuzzy rule interpolation (FRI) …

Machine learning algorithms for network intrusion detection

J Li, Y Qu, F Chao, HPH Shum, ESL Ho, L Yang - AI in Cybersecurity, 2019 - Springer
Network intrusion is a growing threat with potentially severe impacts, which can be
damaging in multiple ways to network infrastructures and digital/intellectual assets in the …

Intrusion detection and mitigation of attacks in microgrid using enhanced deep belief network

D Durairaj, TK Venkatasamy… - Energy Sources, Part …, 2024 - Taylor & Francis
The convergence from the electric grid to the smart microgrid motivates the incorporation of
the intrusion detection system to identify intruders and mitigate the resultant damages to …

A new approach for transformation-based fuzzy rule interpolation

T Chen, C Shang, J Yang, F Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Fuzzy rule interpolation (FRI) is of particular significance for reasoning in the presence of
insufficient knowledge or sparse rule bases. As one of the most popular FRI methods …

New advancements in cybersecurity: A comprehensive survey

MA Hassan, S Ali, M Imad, S Bibi - Big Data Analytics and Computational …, 2022 - Springer
World is now considered as global village because of interconnected networks. Smart
phones and large computing devices exchange millions of information each day. Information …