2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS) 2021
DOI: 10.1109/icais50930.2021.9395929
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Zero-Day Attacks in Network IDS through High Performance Soft Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…For organizing and to deal with uncertain and imprecise facts of real world, in1965 Zadeh invented a technique called Fuzzy Logic, which today is one of the most proficient and widely used soft computing techniques [19,20]. It is also a useful tool for decision making and for managing inaccurate and noisy data.…”
Section: Literature Reviewmentioning
confidence: 99%
“…For organizing and to deal with uncertain and imprecise facts of real world, in1965 Zadeh invented a technique called Fuzzy Logic, which today is one of the most proficient and widely used soft computing techniques [19,20]. It is also a useful tool for decision making and for managing inaccurate and noisy data.…”
Section: Literature Reviewmentioning
confidence: 99%