Learn More
The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS). This paper presents two hybrid approaches for modeling IDS. Decision trees (DT) and support vector machines (SVM) are combined as a hierarchical hybrid intelligent system model (DT–SVM) and an(More)
This chapter presents the biological motivation and some of the theoretical concepts of swarm intelligence with an emphasis on particle swarm optimization and ant colony optimization algorithms. The basic data mining terminologies are explained and linked with some of the past and ongoing works using swarm intelligence techniques. Swarm behavior can be seen(More)
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromise the confidentiality, integrity, availability , or to bypass the security mechanisms of a computer or network. This paper proposes the development of an Intrusion Detection Program(More)
This paper proposes a new perspective for solving systems of complex nonlinear equations by simply viewing it as a multiobjective optimization problem. Every equation in the system represents an objective function whose goal is to minimize the difference between the right and left term of the corresponding equation. An evolutionary computation technique is(More)
The use of intelligent systems for stock market predictions has been widely established. This paper introduces a genetic programming technique (called Multi-Expression programming) for the prediction of two stock indices. The performance is then compared with an artificial neural network trained using Levenberg-Marquardt algorithm, support vector machine,(More)
Due to the wide deployment of sensor networks recently security in sensor networks has become a hot research topic. Popular ways to secure a sensor network are by including cryptographic techniques or by safeguarding sensitive information from unauthorized access/manipulation and by implementing efficient intrusion detection mechanisms. This paper proposes(More)
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. An IDS does not eliminate the use of preventive mechanism but it works as the last defensive mechanism in securing the system. This Chapter evaluates the performances of two Genetic(More)
In a computational grid, at time t, the task is to allocate the user defined jobs efficiently by meeting the deadlines and making use of all the available resources. In the past, objectives were combined and the problem is very often simplified to a single objective problem. In this paper, we formulate a novel Evolutionary Multi-Objective (EMO) approach by(More)