Vis enkel innførsel

dc.contributor.authorShalaginov, Andrii
dc.date.accessioned2018-04-05T10:55:42Z
dc.date.available2018-04-05T10:55:42Z
dc.date.created2017-10-13T17:22:16Z
dc.date.issued2017
dc.identifier.isbn978-1-5090-6182-2
dc.identifier.urihttp://hdl.handle.net/11250/2492797
dc.description.abstractNeural Networks have been successfully used in different fields of Information Security such that network intrusion detection and malware analysis because of ability to provide high level of abstraction for complex and incomplete data. Despite its successful application as off-line learning method, the on-line learning can be challenging when dealing with data streams. This paper presents an ongoing research on on-line Neural Network for Access Control. It can be used for similarity-based access to sensitive information. Conventional training is not efficient when dealing with data streams such that access patterns flow since the availability of the data samples is limited. Considering this obstacle we proposed to use Genetic Algorithm as meta-heuristic optimization in selection of individual training rates α for each weight. Similarity-based Access Control mechanism deals with a data stream that includes continuous flow of attributes characterizing user and resources, so the task is to estimate the likelihood of legitimacy of user accessing a particular resource in dynamic environment. This research contributes to the field of Information Security by overcoming the limitations of data stream mining in agile environment.nb_NO
dc.language.isoengnb_NO
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)nb_NO
dc.relation.ispartof2017 International Joint Conference on Neural Networks (IJCNN)
dc.relation.urihttp://ieeexplore.ieee.org/document/7965937/
dc.titleEvolutionary optimization of on-line multilayer perceptron for similarity-based access controlnb_NO
dc.typeChapternb_NO
dc.description.versionsubmittedVersionnb_NO
dc.source.pagenumber823-830nb_NO
dc.identifier.doi10.1109/IJCNN.2017.7965937
dc.identifier.cristin1504540
dc.description.localcode© 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextpreprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel