This HTML5 document contains 48 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n9http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n14http://purl.org/net/nknouf/ns/bibtex#
n11http://localhost/temp/predkladatel/
n18http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n17http://linked.opendata.cz/resource/domain/vavai/projekt/
n10http://linked.opendata.cz/ontology/domain/vavai/
n3https://schema.org/
shttp://schema.org/
n5http://linked.opendata.cz/ontology/domain/vavai/riv/
skoshttp://www.w3.org/2004/02/skos/core#
n8http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F61989100%3A27240%2F10%3A86085135%21RIV13-MSM-27240___/
n20http://bibframe.org/vocab/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n6http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n22http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n19http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n16http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n21http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n12http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n13http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F61989100%3A27240%2F10%3A86085135%21RIV13-MSM-27240___
rdf:type
n10:Vysledek skos:Concept
dcterms:description
Computer security is very important in these days. Computers are used probably in any industry and their protection against attacks is very important task. The protection usually consist in several levels. The first level is preventions. Intrusion detection system (IDS) may be used as next level. IDS is useful in detection of intrusions, but also in monitoring of security issues and the traffic. This paper present IDS based on Flexible Neural Trees. Flexible neural tree is hierarchical neural network, which is automatically created using evolutionary algorithms to solving of defined problem. This is very important, because it is not necessary to set the structure and the weights of neural networks prior the problem is solved. The accuracy of proposed technique is always above 98% and the speed of decision making process enable its using in real-time applications. 2010 IEEE. 2010 IEEE. Computer security is very important in these days. Computers are used probably in any industry and their protection against attacks is very important task. The protection usually consist in several levels. The first level is preventions. Intrusion detection system (IDS) may be used as next level. IDS is useful in detection of intrusions, but also in monitoring of security issues and the traffic. This paper present IDS based on Flexible Neural Trees. Flexible neural tree is hierarchical neural network, which is automatically created using evolutionary algorithms to solving of defined problem. This is very important, because it is not necessary to set the structure and the weights of neural networks prior the problem is solved. The accuracy of proposed technique is always above 98% and the speed of decision making process enable its using in real-time applications. 2010 IEEE. 2010 IEEE.
dcterms:title
Fast intrusion detection system based on flexible neural tree Fast intrusion detection system based on flexible neural tree
skos:prefLabel
Fast intrusion detection system based on flexible neural tree Fast intrusion detection system based on flexible neural tree
skos:notation
RIV/61989100:27240/10:86085135!RIV13-MSM-27240___
n5:aktivita
n19:S n19:P
n5:aktivity
P(FR-TI1/420), S
n5:dodaniDat
n13:2013
n5:domaciTvurceVysledku
Abraham Padath, Ajith n18:2349434 n18:6026877 n18:4347269
n5:druhVysledku
n12:D
n5:duvernostUdaju
n22:S
n5:entitaPredkladatele
n8:predkladatel
n5:idSjednocenehoVysledku
258829
n5:idVysledku
RIV/61989100:27240/10:86085135
n5:jazykVysledku
n16:eng
n5:klicovaSlova
Real-time classification; Intrusion detection; Genetic algorithm; Flexible neural tree
n5:klicoveSlovo
n6:Real-time%20classification n6:Intrusion%20detection n6:Genetic%20algorithm n6:Flexible%20neural%20tree
n5:kontrolniKodProRIV
[5553AE86D994]
n5:mistoKonaniAkce
Atlanta
n5:mistoVydani
New York
n5:nazevZdroje
2010 6th International Conference on Information Assurance and Security, IAS 2010
n5:obor
n21:IN
n5:pocetDomacichTvurcuVysledku
4
n5:pocetTvurcuVysledku
4
n5:projekt
n17:FR-TI1%2F420
n5:rokUplatneniVysledku
n13:2010
n5:tvurceVysledku
Novosád, Tomáš Platoš, Jan Abraham Padath, Ajith Snášel, Václav
n5:typAkce
n9:WRD
n5:zahajeniAkce
2010-08-23+02:00
s:numberOfPages
6
n20:doi
10.1109/ISIAS.2010.5604057
n14:hasPublisher
IEEE
n3:isbn
978-1-4244-7408-0
n11:organizacniJednotka
27240