OODA Principles for Finding Unknown Malware
Abstract
Keywords: Artificial neural network (ANN), confidentiality, integrity and availability (CIA), intelligence intrusion prevention systems (IIPS), intelligence intrusion detection systems (IIDS)
Full Text:
PDFReferences
Gomes R., da Frota Mattos L.A. Attacks detection based on Ip and Tcp protocols violations normal.
Guangmin L. Modeling unknown web attacks in network anomaly detection. ICCIT, Third International Conference on Convergence and Hybrid Information Technology. 2008; 2: 112–6p.
Dulanović N., Hinić D., Simić D. An intrusion prevention system as a proactive security mechanism in network infrastructure. Yugoslav J Oper Res. 2008; 18(1): 109–22p.
Ibrahim A., Farag M.A., Shouman T.S. et al. Intelligent system–worm detection.
Tafazzoli T., Sadjadi S.H. Malware fuzzy ontology for semantic web. Int. J. Comput Sci Net Sec. 2008 July; 8(7).
de Castro L.N., Von Zuben F.J. Immune and neural network models: theoretical and empirical comparisons. Evol Comput. IEEE. 2002; 6(3): 239–51
DOI: https://doi.org/10.37628/ijmdic.v1i2.107
Refbacks
- There are currently no refbacks.