2018
DOI: 10.1007/978-3-319-98678-4_21
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection and Risk Evaluation in Online Transactions Using Partitioning Methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1
1

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…The origin can participate in all clusters (lines) as a full member. These objects such as the origin and alike are called critical objects [32]. Addressing the critical objects is very important, as we need to encourage or prevent objects to/from participating in other clusters.…”
Section: New Learning Methodology (Bfpm)mentioning
confidence: 99%
See 1 more Smart Citation
“…The origin can participate in all clusters (lines) as a full member. These objects such as the origin and alike are called critical objects [32]. Addressing the critical objects is very important, as we need to encourage or prevent objects to/from participating in other clusters.…”
Section: New Learning Methodology (Bfpm)mentioning
confidence: 99%
“…The proposed method has been applied on real applications and problems from different domains such as medicine (lung cancer diagnosis) [30], intrusion detection systems [32], and banking (financial) systems and risk managements (decision making systems) [35]. The proposed methodology has been utilized in both supervised and unsupervised learning strategies, but in this paper clustering problems have been selected for experimental verifications.…”
Section: Experimental Verificationmentioning
confidence: 99%
“…The chapter demonstrates the achievements of the proposed method and the introduced similarity and membership functions in comparison with other methods. The proposed method has been already published in the Fuzzy Sets and Systems Journal [11] as well as other ideas in different papers cited at the end of the Thesis [12], [13][14][15][16][17][18][19][20], [21].…”
Section: Thesis Organizationmentioning
confidence: 99%
“…Regarding the cyber threat taxonomy [12], different types of threat can be detected and prevented using machine learning approaches. Further more, the Thesis considers both classification and clustering approaches in its experimental verifications to evaluate and illustrate the ability of the proposed methods in intrusion detection and prevention systems.…”
Section: Example In Security and Risk Managementmentioning
confidence: 99%
See 1 more Smart Citation