Computation, Cryptography, and Network Security 2015
DOI: 10.1007/978-3-319-18275-9_7
|View full text |Cite
|
Sign up to set email alerts
|

A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
24
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 30 publications
(25 citation statements)
references
References 38 publications
1
24
0
Order By: Relevance
“…The paper on network anomaly detection based on neural network evolution written by Konstantinos Demertzis and Lazaros Iliadis [3], describes an intelligent system of machine learning, where part of the system works looking for known threats, and another part tries to detect probable threats according to abnormal activities that take place in the order. The detection system is simple, it generates a state being treated as usual, and all the signals outside the edge of that state are processed as an anomaly, so the detection algorithm learns continuously while the system is active in the network, is more and more need.…”
Section: Sql Injection Attack Identification Methodology (Model-biohamentioning
confidence: 99%
See 3 more Smart Citations
“…The paper on network anomaly detection based on neural network evolution written by Konstantinos Demertzis and Lazaros Iliadis [3], describes an intelligent system of machine learning, where part of the system works looking for known threats, and another part tries to detect probable threats according to abnormal activities that take place in the order. The detection system is simple, it generates a state being treated as usual, and all the signals outside the edge of that state are processed as an anomaly, so the detection algorithm learns continuously while the system is active in the network, is more and more need.…”
Section: Sql Injection Attack Identification Methodology (Model-biohamentioning
confidence: 99%
“…The methodology used in the article was the Spiking Artificial Neural Networks (SANN) [3], which uses an Evolving Connectionist System (eCOS) and Multi-Layer Feed Forward ANN approach to classify the exact type of intrusion or network abnormality with minimal computational potential. SANN is a set of modular systems based on node connections.…”
Section: Sql Injection Attack Identification Methodology (Model-biohamentioning
confidence: 99%
See 2 more Smart Citations
“…The CiantiMF system is a biologically inspired artificial intelligence computer security technique [8][9][10][11][12]. Unlike other existing approaches which are based on individual passive safety techniques, the CiantiMF is an integrated active safety system.…”
Section: Innovation Of the Proposed Methodsmentioning
confidence: 99%