2017
DOI: 10.5958/0976-5506.2017.00517.4
|View full text |Cite
|
Sign up to set email alerts
|

A genetic-Fuzzy Approach for Detection of Worm Attack in Ad-Hoc Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 0 publications
0
1
0
1
Order By: Relevance
“…Of particular interest is the analysis of the possibility of building FCM ensembles to increase the effectiveness of risk assessment using several options for formalizing the expert's knowledge and experience. This issue is partially considered in the works [25][26][27], devoted mainly to the use of these cognitive models in the construction of attack detection systems and the assessment of information risks associated with them, but the issue of intelligent management systems in highly specialized industries, such as for example, the printing industry.…”
Section: Overview Of the Main Aspects Of The Theory Of Fuzzy Cognitiv...mentioning
confidence: 99%
“…Of particular interest is the analysis of the possibility of building FCM ensembles to increase the effectiveness of risk assessment using several options for formalizing the expert's knowledge and experience. This issue is partially considered in the works [25][26][27], devoted mainly to the use of these cognitive models in the construction of attack detection systems and the assessment of information risks associated with them, but the issue of intelligent management systems in highly specialized industries, such as for example, the printing industry.…”
Section: Overview Of the Main Aspects Of The Theory Of Fuzzy Cognitiv...mentioning
confidence: 99%
“…Главное внимание будет уделено их совместному использованию в составе ансамбля НКК с целью повышения эффективности оценки риска за счет использования различных способов формализации знаний и опыта эксперта. Этот вопрос практически не освещен в литературе, за исключением ряда работ [136][137][138][139], посвященных главным образом использованию указанных выше когнитивных моделей при построении систем обнаружения атак и оценке связанных с ними информационных рисков.…”
Section: анализ рисков кибербезопасности промышленных объектов с помоunclassified