2017
DOI: 10.19101/ijacr.2017.730022
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy zero day exploits detector system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Combining the parameter-seeking ability of ant colony optimization algorithm and the nonlinear operation ability of SVM improves the classification performance of SVM; the better global search ability of genetic algorithm is used for the selection of optimal features and the calculation of optimal parameters of SVM, which can avoid the premature sieving of beneficial information in feature selection and further improve the performance of prediction models [8]. It inputs software defect features and historical defect data into the artificial neural network model, compares the error between the output results and the actual results, and corrects the data using a back-propagation algorithm to adjust parameters such as the connection weights of ANNs by an iterative method to continuously optimize and obtain the optimal network parameters [9]. is method has the feature of high prediction accuracy, but the training speed is slow because of the need to iteratively optimize the network parameters.…”
Section: Current Status Of Researchmentioning
confidence: 99%
“…Combining the parameter-seeking ability of ant colony optimization algorithm and the nonlinear operation ability of SVM improves the classification performance of SVM; the better global search ability of genetic algorithm is used for the selection of optimal features and the calculation of optimal parameters of SVM, which can avoid the premature sieving of beneficial information in feature selection and further improve the performance of prediction models [8]. It inputs software defect features and historical defect data into the artificial neural network model, compares the error between the output results and the actual results, and corrects the data using a back-propagation algorithm to adjust parameters such as the connection weights of ANNs by an iterative method to continuously optimize and obtain the optimal network parameters [9]. is method has the feature of high prediction accuracy, but the training speed is slow because of the need to iteratively optimize the network parameters.…”
Section: Current Status Of Researchmentioning
confidence: 99%
“…Unfortunately, those methodologies will, in general, be "wait-and-see games;" they require viruses to be distinguished and available in the provisioned database before they can be halted, normally deciding new or "zeroday" exploits can go uncaught for some time. The fuzzy exploits monitor expects to find these obscure infections dependent on current PC conditions [3]. Therefore, the general level of security a framework can't be secured by somewhat perceiving the quantity of realized vulnerabilities existing in the framework.…”
Section: Introductionmentioning
confidence: 99%