The Foundations and Principles of Computational Intelligence
Abstract
Keywords: artificial intelligence, data mining, intelligent intrusion detection system
Full Text:
PDFReferences
Bezdek J. What is computational Intelligence? In: Computational Intelligence Imitationg Life. Zurada L., Marks R., Robinsons C., Eds. New York: IEEE Press; 1994. 1–12p.
Hentea M. Intelligent system for information security management: architecture and design issues. Issues Inform Sci Inform Technol. 2007a; 4: 29–43p.
Manikopoulos C., Papavassiliou S. Network intrusion and fault detection: a statistical anomaly approach. IEEE Commun Mag. 2002; 40(10): 76–82p.
Rodd M.G. Real-time AI for industrial control: a review. ICARV ’92 Second International Conference on Automation, Robotics and Computer Vision. Singapore; 1992. 36–38p.
Hentea M. Architecture and design issues in a hybrid knowledge-based expert system for intelligent quality control. PhD Thesis, Illinois Institute of Technology, Chicago, Illinois; 1997b.
Passino K.M., Ozguner U.U. Intelligent control: From theory to application. IEEE Expert Intell Syst Appl. 1996; 11(2): 28–30p.
Cardoso R.C., Freire M.M. Security vulnerabilities and exposures in internet systems and services. In: Encyclopedia of Multimedia Technology and Networking. Pagani M., Ed. Hershey, Pennsylvania: Idea Group; 2005. 910–6p.
Ramanujan S., Capretez M.A.M. ADAM: A multi-agent system for autonomous database administration and maintenance. Int J Intell Inform Technol. 2005; 1(3): 14–33p.
Yao Y., Wang F.-Y., Zeng D., et al. Rule + exception strategies for security information analysis. IEEE Intell Syst. 2005; 19(5): 52–57p.
Kung S.Y., Mak M.W., Lin S.H. Biometric Authentication. Upper Saddle River, New Jersey: Prentice Hall Professional Technical Reference; 2005.
Willow C.C. A neural network-based agent framework for mail server management. Int J Intell Inform Technol. 2005; 1(4): 36–52p.
DOI: https://doi.org/10.37628/ijaic.v1i2.115
Refbacks
- There are currently no refbacks.