Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569)
DOI: 10.1109/nafips.2001.944405
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy cognitive maps for decision support in an intelligent intrusion detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 58 publications
(26 citation statements)
references
References 11 publications
0
26
0
Order By: Relevance
“…The reader can refer to [44] and [45] for details about CM early usages, and to [46], [47], [48] and [9] for more recent studies. Several applications were developed, reported in [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], etc.…”
Section: Fuzzy Cognitive Maps As Modelling Techniquementioning
confidence: 99%
“…The reader can refer to [44] and [45] for details about CM early usages, and to [46], [47], [48] and [9] for more recent studies. Several applications were developed, reported in [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], etc.…”
Section: Fuzzy Cognitive Maps As Modelling Techniquementioning
confidence: 99%
“…The application of fuzzy inference rules in expert domains is a common knowledge and FCM has been applied to a wide variety of strategic domains [8][9][10][11] . In this illustration, fuzzy inference and cognitive systems have been presented in interconnected perspective to trace the critical path of a research organisation.…”
Section: Illustrationmentioning
confidence: 99%
“…Researchers have used FCMs for many tasks in several different domains. Use of FCMs was first reported in [11] for fusing alert information in a multi-sensor intrusion detection environment to assess network health. Fuzzy Intrusion Recognition Engine, a network based IDS, also use FCMs in detecting attacks from features extracted from network traffic [12].…”
Section: Related Workmentioning
confidence: 99%
“…Fuzzy Intrusion Recognition Engine, a network based IDS, also use FCMs in detecting attacks from features extracted from network traffic [12]. The work that we present in this paper differs from our previous work [11] primarily in the focus of the research, which is discovery of causal relationships between alerts rather than structural relationships and in the use of abstract FCM models to address issues of scalability and uncertainly.…”
Section: Related Workmentioning
confidence: 99%