N. A. Musa, M. Yusoff, Yunus Yusoff, Roslan Ismail
{"title":"利用数据分析技术提取模糊推理系统的阈值,对恶意代理进行分类","authors":"N. A. Musa, M. Yusoff, Yunus Yusoff, Roslan Ismail","doi":"10.1109/ICIMU.2014.7066601","DOIUrl":null,"url":null,"abstract":"This paper describes a data analysis technique used to extract threshold values of a Fuzzy Inference System's (FIS) inputs. In this work, the FIS is used to classify malicious agents' behaviour in a Multi-Agent System (MAS) environment. The extraction of suitable FIS inputs threshold values in the MAS environment are based on data analysis derived from several simulation runs. Subsequently, the extracted threshold values are applied in the rules of the FIS framework for classifying malicious agents' behaviors. Results indicated that extracting the fuzzy threshold values using the data analysis technique is an acceptable alternative method when no domain expert is available.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Data analysis technique to extract threshold value for Fuzzy Inference System in classifying malicious agents\",\"authors\":\"N. A. Musa, M. Yusoff, Yunus Yusoff, Roslan Ismail\",\"doi\":\"10.1109/ICIMU.2014.7066601\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper describes a data analysis technique used to extract threshold values of a Fuzzy Inference System's (FIS) inputs. In this work, the FIS is used to classify malicious agents' behaviour in a Multi-Agent System (MAS) environment. The extraction of suitable FIS inputs threshold values in the MAS environment are based on data analysis derived from several simulation runs. Subsequently, the extracted threshold values are applied in the rules of the FIS framework for classifying malicious agents' behaviors. Results indicated that extracting the fuzzy threshold values using the data analysis technique is an acceptable alternative method when no domain expert is available.\",\"PeriodicalId\":408534,\"journal\":{\"name\":\"Proceedings of the 6th International Conference on Information Technology and Multimedia\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 6th International Conference on Information Technology and Multimedia\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIMU.2014.7066601\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 6th International Conference on Information Technology and Multimedia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIMU.2014.7066601","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data analysis technique to extract threshold value for Fuzzy Inference System in classifying malicious agents
This paper describes a data analysis technique used to extract threshold values of a Fuzzy Inference System's (FIS) inputs. In this work, the FIS is used to classify malicious agents' behaviour in a Multi-Agent System (MAS) environment. The extraction of suitable FIS inputs threshold values in the MAS environment are based on data analysis derived from several simulation runs. Subsequently, the extracted threshold values are applied in the rules of the FIS framework for classifying malicious agents' behaviors. Results indicated that extracting the fuzzy threshold values using the data analysis technique is an acceptable alternative method when no domain expert is available.