The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowdays, IDS (Intrusion Detection System) is a hot topic in the information security. The main function of IDS is distinguishing and predicting normal or abnormal behaviors. This paper is to propose a model used on IDS, it is based on rough set (RS) theory and fuzzy support vector machine (FSVM). Firstly, the model set rough set as a preprocessor of FSVM. Rough set can reduce dimensions of attributes...
In this paper, presents a intrusion detection model based on hierarchical structure in wireless sensor network. The model structure is simple and improves the security of wireless sensor networks; this model uses a multi-node with the idea of joint collaboration, intrusion detection nodes with anomaly detection algorithm. It shows through experiments with real data that the algorithm can lower the...
Support vector machine(SVM) is sensitive to the noises and outliers in the training samples, so fuzzy support vector machine(FSVM) precede support vector machine in solving the problem of non-linearity high dimension and uncertainty. At the same time, for the practicability, the multi-class support vector machine is a good choice. In this paper, we combine the fuzzy support vector machine and multi-class...
In Serviced-Oriented Computing (SOC) environments, the trust level of a service or a service provider is a critical issue for a service client to consider, particularly when the client is looking for a service from a large set of services or service providers. However, a service may invoke other services offered by different providers forming composite services. The complex invocation relations significantly...
Intrusion Detection System (IDS) has recently emerged as an important component for enhancing information system security. Data mining and machine learning technology has been extensively applied in network intrusion detection and prevention systems by discovering user behavior patterns from the network traffic data. In this paper, we propose a novel signature searching to detect intrusion based on...
Trust is a critical issue in e-commerce and e-service environments. In some applications (such as eBay), the trust management mechanisms have been introduced to provide valuable information to buyers prior to placing orders and making payments. Meanwhile, the trust issue is also actively studied in the research community. However, most studies and applications focus on approaches that result in a...
Trust is a critical issue in e-commerce and e-service environments. Some applications (such as eBay) have introduced various trust management mechanisms to provide valuable information to buyers prior to placing orders and making payments. While trust has been actively studied in the research community, some malicious sellers and fraudulent transactions still widely exist. A typical attack is to entice...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.