Abstract:This chapter introduces two different algorithms to detect intrusions in mission critical communication systems to guarantee their security. The first algorithm is a classification algorithm which applies the concept of supervised learning. The second algorithm is a clustering algorithm which applies the concept of unsupervised learning. The algorithms detect intrusions using a set of detection rules that are structured in the form of decision trees. The algorithms are described in details and their results on… Show more
“…In papers [9,10], authors analyzed models for estimating risks for CS at the objects of informatization by using ES. The studies have failed to introduce any application software to the market.…”
Section: разработаны метод и модель управления киберзащитой объекта иmentioning
“…In papers [9,10], authors analyzed models for estimating risks for CS at the objects of informatization by using ES. The studies have failed to introduce any application software to the market.…”
Section: разработаны метод и модель управления киберзащитой объекта иmentioning
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.