2016 IEEE 8th International Conference on Intelligent Systems (IS) 2016
DOI: 10.1109/is.2016.7737389
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Automated Intrusion Response System based on fuzzy decision making and risk assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3
2

Relationship

3
5

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…The process of truncating a given function f at the value y = y 0 generates a new function g that has the same output as f except that any output value greater than y 0 becomes y 0 , as shown in (8).…”
Section: Definitionmentioning
confidence: 99%
See 1 more Smart Citation
“…The process of truncating a given function f at the value y = y 0 generates a new function g that has the same output as f except that any output value greater than y 0 becomes y 0 , as shown in (8).…”
Section: Definitionmentioning
confidence: 99%
“…Solutions known as fuzzy inference systems (FIS) were then designed to map a set of inputs to outputs, using fuzzy logic and fuzzy sets to define vague conditions. These characteristics allowed fuzzy logic and fuzzy set theory to find a lot of uses in various areas, such as medicine [5]- [7], computer security [8]- [14], networking [15], [16], aeronautics [17], stock trading [18], and many others [4], [19]- [22].…”
Section: Introductionmentioning
confidence: 99%
“…Finding a malicious user from its neighbors is a selection problem. Methods such as fuzzy decision making [17], [18] and genetic-based algorithms [19] can be used to select the free-riders from multiple criteria. A successful trust management system that uses this approach is [20].…”
Section: Related Workmentioning
confidence: 99%
“…We exploit fuzzy logic as an appropriate method that is widely adopted in a mixed variety of IT systems such as wireless networks, intrusion detection systems, etc. [18][19][20], especially, as it has been extensively employed as the core of decision-making systems [21]. The output of a fuzzy controller is obtained from the fuzzification of inputs using the associated membership functions (MFs).…”
Section: Fair: Fuzzy Alarming Index Rulementioning
confidence: 99%