Do Smart Adaptive Systems Exist?
DOI: 10.1007/3-540-32374-0_9
|View full text |Cite
|
Sign up to set email alerts
|

Evolving Connectionist Systems with Evolutionary Self-Optimisatio

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…These ranges from communication-oriented approaches like authentication protocols over blacklisting to content-based filtering approaches which usually depend on some of Artificial Intelligence (AI) techniques (Bergholz et al, 2010). Current AI algorithms are able to detect phishing e-mail based on fixed features and rules while a few number of machine learning algorithms design to work in online mode (N. Kasabov, 2005). The level of errors in the classification process will increase over time, especially when dealing with unknown zero-day phishing e-mails.…”
Section: Introductionmentioning
confidence: 99%
“…These ranges from communication-oriented approaches like authentication protocols over blacklisting to content-based filtering approaches which usually depend on some of Artificial Intelligence (AI) techniques (Bergholz et al, 2010). Current AI algorithms are able to detect phishing e-mail based on fixed features and rules while a few number of machine learning algorithms design to work in online mode (N. Kasabov, 2005). The level of errors in the classification process will increase over time, especially when dealing with unknown zero-day phishing e-mails.…”
Section: Introductionmentioning
confidence: 99%