• No results found

Intelligent Intrusion Detection in Computer Networks using Swarm Intelligence

N/A
N/A
Protected

Academic year: 2020

Share "Intelligent Intrusion Detection in Computer Networks using Swarm Intelligence"

Copied!
9
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Fig. 1.Classification of Intrusion Detection Systems [9] (a) Approachesbased upon the type of attacks
Fig. 3.Non-Negative Matrix Factorization
Table 1. Example of sequence
Fig. 4.Broad overview of class diagram of the proposed approach towards Computer Intrusion System
+2

References

Related documents

The insights drawn from using different models and comparing MAPE scores not only benefits the overall demand planning outcome but gives us an opportunity to dig deeper

Using multiple regression analysis, it was established that improved transport infrastruc- ture, communication infrastructure, water and waste infrastructure, exchange rate,

Research tasks: - to find appropriate conservation methods of seed of the wild plants of Kazakhstan; - to test the available techniques in the conditions of the seed bank of

The aim of this paper is to harvest maximum energy from the solar panel using voltage located.. MPPT circuit for low power application below various

Learning from the examples of successful blogs by elementary teachers, four common types of classroom blogs with accompanying examples are shared: Classroom News Blogs, Mirror Blogs,

According to this study, ontological aspect of historical methodology should combine a new evolutionary version of neutral monism, universal theories of evolution, based on

From this list, a patient guide was designed for the patient interviews. The objectives of the guide were to 1) collect patients' opinions and perspectives on the management

this was a response to the problem of rising serial prices 8 and the resulting tension between the need to cancel journal subscriptions while still providing access to needed items 9