National Repository of Grey Literature 2 records found  Search took 0.00 seconds. 
Applications of Artificial Intelligence in IT security
Vašátko, Viktor ; Vomlelová, Marta (advisor) ; Neruda, Roman (referee)
The objective of this work is to explore the intrusion detection prob- lem and create simple rules for detecting specific intrusions. The intrusions are explored in the realistic CSE-CIC-IDS2018 dataset. First, the dataset is analyzed by computing appropriate statistics and visualizing the data. In the data visu- alization various dimensionality reduction methods are tested. After analyzing the dataset the data are normalized and prepared for the training. The training process focuses on feature selection and finding the best model for the intrusion detection problem. The feature selection is also used for creating rules. The rules are extracted from an ensemble of Decision Trees. At the end of this work, the rules are compared to the best model. The experiments demonstrate that the simple rules are able to achieve similar results as the best model and can be used in a rule-based intrusion detection system or be deployed as a simple model. 1
Artificial Intelligence for the Risk Game
Vašátko, Viktor ; Pilát, Martin (advisor) ; Gemrot, Jakub (referee)
The aim of this work is the implementation of the game Risk and ex- ploration how to develop artificial intelligence into game. Game implementation and artificial intelligence experiments are written in C# programming language. Two approaches are tested in the development of artificial intelligence. One ap- proach uses the Monte Carlo tree search algorithm (MCTS) with two different heuristics and the other tries to solve the problem with neural networks. Neural networks have two uses. One use is for the artificial intelligence itself and the se- cond use is in one of the heuristics. Through the research, we found that the best player is the artificial intelligence using MCTS, but on big maps it has problem. On the other hand, the artificial intelligence with neural network can play on any map and therefore could potentially be another aim of research. The result of the work is the basis for further development of artificial intelligence. 1

Interested in being notified about new results for this query?
Subscribe to the RSS feed.