@INPROCEEDINGS{8015710, author={L. Yang and J. Li and G. Fehringer and P. Barraclough and G. Sexton and Y. Cao}, booktitle={2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)}, title={Intrusion detection system by fuzzy interpolation}, year={2017}, volume={}, number={}, pages={1-6}, keywords={computational complexity;computer network security;fuzzy set theory;interpolation;knowledge based systems;complex systems;complexity challenge;data-driven approaches;fuzzy interpolation;generalization ability;malicious connections;network attack protection;network intrusion detection systems;security alerts;sparse rule base;system evaluation;system validation;Computer security;Fuzzy logic;Fuzzy sets;IP networks;Interpolation;Intrusion detection;Training data}, doi={10.1109/FUZZ-IEEE.2017.8015710}, ISSN={}, month={July},}