The use of computational intelligence in intrusion detection systems: A review

SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …

[PDF][PDF] A survey about fuzzy cognitive maps papers

J Aguilar - International journal of computational cognition, 2005 - researchgate.net
In this paper we present different results and studies around the world about the Fuzzy
Cognitive Maps. This technique is the fusion of the advances of the fuzzy logic and cognitive …

Effective intrusion detection using multiple sensors in wireless ad hoc networks

O Kachirski, R Guha - 36th Annual Hawaii International …, 2003 - ieeexplore.ieee.org
In this paper we propose a distributed intrusion detection system for ad hoc wireless
networks based on mobile agent technology. Wireless networks are particularly vulnerable …

Intrusion detection using mobile agents in wireless ad hoc networks

O Kachirski, R Guha - Proceedings. IEEE Workshop on …, 2002 - ieeexplore.ieee.org
In this paper we propose a distributed intrusion detection system for ad hoc wireless
networks based on mobile agent technology. Wireless networks are particularly vulnerable …

A graph based approach toward network forensics analysis

W Wang, TE Daniels - ACM Transactions on Information and System …, 2008 - dl.acm.org
In this article we develop a novel graph-based approach toward network forensics analysis.
Central to our approach is the evidence graph model that facilitates evidence presentation …

A distributed intrusion detection system for resource-constrained devices in ad-hoc networks

AP Lauf, RA Peters, WH Robinson - Ad Hoc Networks, 2010 - Elsevier
This paper describes the design and implementation of a two-stage intrusion detection
system (IDS) for use with mobile ad-hoc networks. Our anomaly-based intrusion detection is …

Analyzing risk impact factors using extended fuzzy cognitive maps

B Lazzerini, L Mkrtchyan - IEEE Systems Journal, 2011 - ieeexplore.ieee.org
One of the challenges in Risk Analysis and Management (RAM) is identifying the
relationships between risk factors and risks. The complexity of the method to analyze these …

[LIBRO][B] Security in RFID and sensor networks

P Kitsos - 2016 - taylorfrancis.com
In the past several years, there has been an increasing trend in the use of Radio Frequency
Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of …

Learning of fuzzy cognitive maps using density estimate

W Stach, W Pedrycz, LA Kurgan - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Fuzzy cognitive maps (FCMs) are convenient and widely used architectures for modeling
dynamic systems, which are characterized by a great deal of flexibility and adaptability …

Cyber-security challenges with smes in develo** economies: Issues of confidentiality, integrity & availability (CIA)

EO Yeboah-Boateng - 2013 - vbn.aau.dk
The essence of this study is first to highlight the cyber-security challenges confronting SMEs
in develo** economies, and to model a framework for safeguarding their assets, to ensure …