2017 International Conference on Intelligent Computing and Control (I2C2) 2017
DOI: 10.1109/i2c2.2017.8321877
|View full text |Cite
|
Sign up to set email alerts
|

Survey of genetic algorithm effectiveness in intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Several propositioned AI algorithms, including DPM-MN, attempt to imitate biological solutions. A couple examples include genetic algorithms (Gnanaprasanambikai, et al, 2018) and neural networks. The new frontier for biological imitation is the brain/mind.…”
Section: List Of Figures Appendix A: Research Community Goalsmentioning
confidence: 99%
“…Several propositioned AI algorithms, including DPM-MN, attempt to imitate biological solutions. A couple examples include genetic algorithms (Gnanaprasanambikai, et al, 2018) and neural networks. The new frontier for biological imitation is the brain/mind.…”
Section: List Of Figures Appendix A: Research Community Goalsmentioning
confidence: 99%
“…Wang et al [18] suggest PW Join, is a three-operation algorithm designed to add binary windows to activities that are value-driven and can be found in streaming data. In Daoud [19] authors suggest GrubJoin, a multi-purpose, adaptive window data stream connection to efficiently complete CPU load flaking associations.…”
Section: Related Workmentioning
confidence: 99%