Mostrando 5 resultados de: 5
Filtros aplicados
Publisher
Advances in Intelligent Systems and Computing(1)
Decision Making and Soft Computing - Proceedings of the 11th International FLINS Conference, FLINS 2014(1)
IEEE Latin America Transactions(1)
Knowledge-Based Systems(1)
PIC 2014 - Proceedings of 2014 IEEE International Conference on Progress in Informatics and Computing(1)
Área temáticas
Programación informática, programas, datos, seguridad(4)
Funcionamiento de bibliotecas y archivos(2)
Dirección general(1)
Física aplicada(1)
Métodos informáticos especiales(1)
Área de conocimiento
Ciencias de la computación(4)
Algoritmo(2)
Inteligencia artificial(1)
Red neuronal artificial(1)
Toma de decisiones(1)
Origen
google(3)
Data leakage detection algorithm based on task sequences and probabilities
ArticleAbstract: In this paper we propose a novel algorithm to detect anomalous user behaviour in computer sessions.Palabras claves:Anomaly detection, Computer user behaviour, DATA LEAKAGE, Knowledge-based decision system, Markov chainsAutores:César Byron Guevara Maldonado, Cesar Guevara, Lopez V., Santos M.Fuentes:googlescopusNegative Selection and Knuth Morris Pratt Algorithm for Anomaly Detection
ArticleAbstract: In this paper an algorithm for detecting anomalous behavior on computer systems is proposed. The worPalabras claves:Anomaly detection, Behavior Profile, Computer Systems, Knuth Morris Pratt algorithm, Negative SelectionAutores:Cesar Guevara, Lopez V., Santos M.Fuentes:scopusIntrusion detection with neural networks based on knowledge extraction by decision tree
Conference ObjectAbstract: Detection of intruders or unauthorized access to computers has always been critical when dealing witPalabras claves:Behavioral profile, decision tree, intrusion detection, Neural networks, pattern recognition, securityAutores:César Byron Guevara Maldonado, Cesar Guevara, Lopez V., Santos M.Fuentes:googlescopusTraining strategy to improve the efficiency of an intelligent detection system
Conference ObjectAbstract: Detection systems of computer accesses are essential for information security. In this article we prPalabras claves:Autores:Cesar Guevara, Lopez V., Santos M.Fuentes:scopusReaching a consensus on access detection by a decision system
Conference ObjectAbstract: Classification techniques based on Artificial Intelligence are computational tools that have been apPalabras claves:Artificial Intelligence, Decision Trees, heuristic methodologies, intrusion detection (IDS), Naïve Bayes, supervised classifying system UCSAutores:César Byron Guevara Maldonado, Cesar Guevara, Lopez V., Martin J.A., Santos M.Fuentes:googlescopus