Towards fuzzy anomaly detection-based security: a comprehensive review
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Towards fuzzy anomaly detection-based security: a comprehensive review
Authors
Keywords
-
Journal
Fuzzy Optimization and Decision Making
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2020-07-23
DOI
10.1007/s10700-020-09332-x
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems
- (2020) Mohammad Masdari et al. APPLIED SOFT COMPUTING
- Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things
- (2019) Haripriya A. P. et al. EURASIP Journal on Wireless Communications and Networking
- Green Cloud Computing Using Proactive Virtual Machine Placement: Challenges and Issues
- (2019) Mohammad Masdari et al. Journal of Grid Computing
- A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection
- (2018) Vajiheh Hajisalem et al. Computer Networks
- A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection
- (2018) Zouhair Chiba et al. COMPUTERS & SECURITY
- Network Anomaly Detection System using Genetic Algorithm and Fuzzy Logic
- (2018) Anderson Hiroshi Hamamoto et al. EXPERT SYSTEMS WITH APPLICATIONS
- Detection and differentiation of application layer DDoS attack from flash events using fuzzy-GA computation
- (2018) Khundrakpam Johnson Singh et al. IET Information Security
- A comprehensive survey on network anomaly detection
- (2018) Gilberto Fernandes et al. TELECOMMUNICATION SYSTEMS
- Defending against Packet-In messages flooding attack under SDN context
- (2018) Deyun Gao et al. SOFT COMPUTING
- SFAD: Toward effective anomaly detection based on session feature similarity
- (2018) Ruliang Xiao et al. KNOWLEDGE-BASED SYSTEMS
- Dynamic Fuzzy Rule Interpolation and its Application to Intrusion Detection
- (2017) Nitin Naik et al. IEEE TRANSACTIONS ON FUZZY SYSTEMS
- Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm
- (2017) Muhamad Erza AMINANTO et al. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUT
- A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems
- (2017) Mohammad Masdari et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Key management in wireless Body Area Network: Challenges and issues
- (2017) Mohammad Masdari et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm
- (2017) Muhamad Erza AMINANTO et al. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES
- A Game Theoretical Based System Using Holt-Winters and Genetic Algorithm With Fuzzy Logic for DoS/DDoS Mitigation on SDN Networks
- (2017) Marcos V. O. De Assis et al. IEEE Access
- FCM technique for efficient intrusion detection system for wireless networks in cloud environment
- (2017) Mingming Chen et al. COMPUTERS & ELECTRICAL ENGINEERING
- Fuzzified Cuckoo based Clustering Technique for Network Anomaly Detection
- (2017) Sahil Garg et al. COMPUTERS & ELECTRICAL ENGINEERING
- An adaptive and hybrid artificial bee colony algorithm (aABC) for ANFIS training
- (2016) Dervis Karaboga et al. APPLIED SOFT COMPUTING
- Integration of Cloud computing and Internet of Things: A survey
- (2016) Alessio Botta et al. Future Generation Computer Systems-The International Journal of eScience
- Towards workflow scheduling in cloud computing: A comprehensive analysis
- (2016) Mohammad Masdari et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A survey of network anomaly detection techniques
- (2016) Mohiuddin Ahmed et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- An overview of virtual machine placement schemes in cloud computing
- (2016) Mohammad Masdari et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Intrusion Detection Systems of ICMPv6-based DDoS attacks
- (2016) Omar E. Elejla et al. NEURAL COMPUTING & APPLICATIONS
- A two-level hybrid approach for intrusion detection
- (2016) Chun Guo et al. NEUROCOMPUTING
- A survey and taxonomy of DoS attacks in cloud computing
- (2016) Mohammad Masdari et al. Security and Communication Networks
- Toward an efficient fuzziness based instance selection methodology for intrusion detection system
- (2016) Rana Aamir Raza Ashfaq et al. International Journal of Machine Learning and Cybernetics
- Hybrid Fuzzy Adaptive Wiener Filtering with Optimization for Intrusion Detection
- (2015) Revathi Sujendran et al. ETRI JOURNAL
- Evolving Fuzzy Rules for Anomaly Detection in Data Streams
- (2015) Masud Moshtaghi et al. IEEE TRANSACTIONS ON FUZZY SYSTEMS
- Adaptive Neuro-Fuzzy-Based Anomaly Detection System in Cloud
- (2015) P. Ganeshkumar et al. International Journal of Fuzzy Systems
- Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN
- (2015) N. Pandeeswari et al. MOBILE NETWORKS & APPLICATIONS
- A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks
- (2015) Amin Karami et al. NEUROCOMPUTING
- D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks
- (2014) Shahaboddin Shamshirband et al. MEASUREMENT
- Network Anomaly Detection: Methods, Systems and Tools
- (2013) Monowar H. Bhuyan et al. IEEE Communications Surveys and Tutorials
- Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems
- (2012) P. Arun Raj Kumar et al. COMPUTER COMMUNICATIONS
- A survey of intrusion detection techniques in Cloud
- (2012) Chirag Modi et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Alert correlation in collaborative intelligent intrusion detection systems—A survey
- (2011) Huwaida Tagelsir Elshoush et al. APPLIED SOFT COMPUTING
- Design and analysis of genetic fuzzy systems for intrusion detection in computer networks
- (2010) Mohammad Saniee Abadeh et al. EXPERT SYSTEMS WITH APPLICATIONS
- An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming
- (2010) Shingo Mabu et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND RE
- The use of computational intelligence in intrusion detection systems: A review
- (2009) Shelly Xiaonan Wu et al. APPLIED SOFT COMPUTING
- Intrusion detection using fuzzy association rules
- (2008) Arman Tajbakhsh et al. APPLIED SOFT COMPUTING
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started