All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Towards intrusion detection by information retrieval and genetic programming

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F10%3A86085030" target="_blank" >RIV/61989100:27240/10:86085030 - isvavai.cz</a>

  • Result on the web

    <a href="http://dx.doi.org/10.1109/ISIAS.2010.5604063" target="_blank" >http://dx.doi.org/10.1109/ISIAS.2010.5604063</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1109/ISIAS.2010.5604063" target="_blank" >10.1109/ISIAS.2010.5604063</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Towards intrusion detection by information retrieval and genetic programming

  • Original language description

    Fuzzy classifiers and fuzzy rules are powerful tools in data mining and knowledge discovery. In this work, intrusion detection is approached as a data mining task and genetic programming is deployed to evolve fuzzy classifiers for detection of intrusionand security problems. We train the fuzzy classifier on a data set modeled as a fuzzy information retrieval collection and investigate its ability to detect illegitimate actions. Proposed approach is experimentally evaluated on the popular KDD Cup intrusion detection data set.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/FR-TI1%2F420" target="_blank" >FR-TI1/420: *Integrated software system for optimalization and control of technological processes and prediction of production quality for large technological complexes with use of advanced mathematic method, simulation and artificial intelligence.</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2010

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    2010 6th International Conference on Information Assurance and Security, IAS 2010

  • ISBN

    978-1-4244-7408-0

  • ISSN

  • e-ISSN

  • Number of pages

    6

  • Pages from-to

    112 - 117

  • Publisher name

    IEEE

  • Place of publication

    Piscataway

  • Event location

    Atlanta

  • Event date

    Aug 23, 2010

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article