Izzeldin Mohamed Osman

Learn More
This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may(More)
—Alert correlation analyzes the alerts from one or more collaborative Intrusion Detection Systems (IDSs) to produce a concise overview of security-related activity on the network. The process consists of multiple components, each responsible for a different aspect of the overall correlation goal. The sequence order of the correlation components affects the(More)
Soft computing techniques are widely used in malware detection in these days. These techniques have the ability of learning from the past incidences and can categories normal and abnormal behaviour. In this paper we have reviewed various soft computing techniques. A review of application of these soft-computing techniques in malware detection has also been(More)
  • 1