Modeling of Attack Detection System based on Hybridization of Binary Classifiers
Saved in:
| Date: | 2020 |
|---|---|
| Main Authors: | O. I. Belei, K. K. Kolesnyk |
| Format: | Article |
| Language: | English |
| Published: |
2020
|
| Series: | Artificial intelligence |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001188987 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Binary matroids that classify forests
by: Traldi, L.
Published: (2022)
by: Traldi, L.
Published: (2022)
Detection and Recognition of Objects on Images Based on MKV-Classifiers
by: K. V. Murygin
Published: (2013)
by: K. V. Murygin
Published: (2013)
Construction of a multi-agent attack detection system based on artificial intelligence models
by: O. Belej, et al.
Published: (2021)
by: O. Belej, et al.
Published: (2021)
Neurosymbolic approach for attack detection in satellite communication systems
by: Mostovyi, O.S.
Published: (2024)
by: Mostovyi, O.S.
Published: (2024)
Optimal Quantization to Improve the Quality of Binary Classifiers
by: N. B. Paklin, et al.
Published: (2013)
by: N. B. Paklin, et al.
Published: (2013)
Mathematical algorithm for detecting XSS attacks on web applications
by: Kh. Khamdamov, et al.
Published: (2021)
by: Kh. Khamdamov, et al.
Published: (2021)
The Auxiliary Data Base for Classifier
by: K. Bardiier
Published: (2000)
by: K. Bardiier
Published: (2000)
Security of Poseidon hash function against non-binary differential and linear attacks
by: L. Kovalchuk, et al.
Published: (2021)
by: L. Kovalchuk, et al.
Published: (2021)
Security of Poseidon hash function against non-binary differential and linear attacks
by: Kovalchuk, L., et al.
Published: (2021)
by: Kovalchuk, L., et al.
Published: (2021)
Construction of subsystem determination of attacks in cyberphysical systems by neural network methods
by: O. Belej, et al.
Published: (2021)
by: O. Belej, et al.
Published: (2021)
A neural network assembly memory model based on an optimal binary signal detection theory
by: Gopych, P.M.
Published: (2004)
by: Gopych, P.M.
Published: (2004)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
Asymptotic estimate of depth-based classifiers within the location shift model
by: O. A. Halkin
Published: (2015)
by: O. A. Halkin
Published: (2015)
Detection and avoidance of input validation attacks in web application using deterministic push down automata
by: V. Nitja, et al.
Published: (2019)
by: V. Nitja, et al.
Published: (2019)
Ways of Classifying Digital Platforms
by: N. K. Tymofijeva, et al.
Published: (2024)
by: N. K. Tymofijeva, et al.
Published: (2024)
Classifying the Functions of an Industrial Enterprise as the Basis for Classifying its Potentials
by: S. A. Shpak
Published: (2019)
by: S. A. Shpak
Published: (2019)
A Classifier for Business Models, Focused on Business Processes
by: T. I. Bondareva
Published: (2015)
by: T. I. Bondareva
Published: (2015)
Decision Making Method for Classifying Models Based on Intra-class Clustering on FCM-algorithm
by: Ju. Maksimova
Published: (2013)
by: Ju. Maksimova
Published: (2013)
Neural Network System for Transient Ischemic Attacks Diagnostics
by: V. A. Golovko, et al.
Published: (2014)
by: V. A. Golovko, et al.
Published: (2014)
Research of nonparametric maximum-depth classifiers based on the spatial quantiles
by: O. A. Halkin
Published: (2015)
by: O. A. Halkin
Published: (2015)
Features of the Model of the Offender at the Analysis of Attacks on Global Internet Routing
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
A model of control for counterac-ting against information attacks in cyberspace
by: A. A. Shyian, et al.
Published: (2021)
by: A. A. Shyian, et al.
Published: (2021)
Global Attacks on Decentralized Systems Built on Peer-to-peer Networks
by: P. I. Stetsenko
Published: (2017)
by: P. I. Stetsenko
Published: (2017)
Hemostasis indices in transient ischemic attacks
by: I. A. Hryhorova, et al.
Published: (2021)
by: I. A. Hryhorova, et al.
Published: (2021)
A three-layer defense mechanism based on web servers against distributed denial of service attacks
by: A. T. Rakhmanov, et al.
Published: (2019)
by: A. T. Rakhmanov, et al.
Published: (2019)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Binary Relational Data Model
by: I. S. Chistjakova, et al.
Published: (2017)
by: I. S. Chistjakova, et al.
Published: (2017)
Binary Relational Data Model
by: Chystiakova, I.S., et al.
Published: (2018)
by: Chystiakova, I.S., et al.
Published: (2018)
Classifying the Systems of Scientific and Scientific-Technical Activity of Universities
by: Ye. Kuzmin, et al.
Published: (2018)
by: Ye. Kuzmin, et al.
Published: (2018)
Distinguishing attack on the NTRUCipher encryption scheme
by: A. M. Oleksiichuk, et al.
Published: (2022)
by: A. M. Oleksiichuk, et al.
Published: (2022)
Pictorial binding: endeavor to classify
by: S. V. Zinchenko
Published: (2015)
by: S. V. Zinchenko
Published: (2015)
The research of the asymptotic properties of non-parametric classifiers based on depth functions
by: A. V. Anisimov, et al.
Published: (2015)
by: A. V. Anisimov, et al.
Published: (2015)
Affine-invariant classifier of extrapolation depth based on multilevel smoothing structure
by: A. A. Galkin
Published: (2016)
by: A. A. Galkin
Published: (2016)
A discrete mathematical model SIRS with the evolution of regions to attack infectious diseases
by: Y. Benfatah, et al.
Published: (2023)
by: Y. Benfatah, et al.
Published: (2023)
Affine-invariant depth-based classifiers on the basis of the k-nearest neighbors method
by: O. A. Halkin
Published: (2016)
by: O. A. Halkin
Published: (2016)
Multi-scale hybrid and agent-based modeling of cell differentiation
by: M. Benmir, et al.
Published: (2023)
by: M. Benmir, et al.
Published: (2023)
Classifier of Innovative Goods: Methodological Aspect
by: A. I. Butenko, et al.
Published: (2018)
by: A. I. Butenko, et al.
Published: (2018)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
Model of Shrinking of Binary Hollow Nanoshells
by: T. V. Zaporozhets, et al.
Published: (2012)
by: T. V. Zaporozhets, et al.
Published: (2012)
Similar Items
-
Binary matroids that classify forests
by: Traldi, L.
Published: (2022) -
Detection and Recognition of Objects on Images Based on MKV-Classifiers
by: K. V. Murygin
Published: (2013) -
Construction of a multi-agent attack detection system based on artificial intelligence models
by: O. Belej, et al.
Published: (2021) -
Neurosymbolic approach for attack detection in satellite communication systems
by: Mostovyi, O.S.
Published: (2024) -
Optimal Quantization to Improve the Quality of Binary Classifiers
by: N. B. Paklin, et al.
Published: (2013)