Research Article

Using Genetic Algorithm to Minimize False Alarms in Insider Threats Detection of Information Misuse in Windows Environment

Figure 2

Initial membership functions of input TS.