Harnessing ANN for a secure environment
This paper explores recent works in the application of artificial neural network (ANN) for security ? namely, network security via intrusion detection systems, and authentication systems. This paper highlights a variety of approaches that have been adopted in these two distinct areas of study. In th...
| Main Authors: | Ling, Mee Hong *, Wan, Haslina Hassan* |
|---|---|
| Format: | Article |
| Published: |
Springer Berlin
2010
|
| Subjects: | |
| Online Access: | http://eprints.sunway.edu.my/78/ |
Similar Items
Comparison between ANN and multiple linear regression models for prediction of warranty cost
by: Mohd Faaizie, Darmawan, et al.
Published: (2018)
by: Mohd Faaizie, Darmawan, et al.
Published: (2018)
Virtual hairstyle studio (V-Hair) / Lee Ean Har
by: Lee , Ean Har
Published: (2003)
by: Lee , Ean Har
Published: (2003)
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
by: Milad , Miri
Published: (2018)
by: Milad , Miri
Published: (2018)
Utilize Medical Text Data to Estimate Disease Types by Using Naïve Bayes and ANN Classifier
by: Mujiono, Sadikin, et al.
Published: (2021)
by: Mujiono, Sadikin, et al.
Published: (2021)
Reinforcement learning-based trust and reputation model for spectrum leasing in cognitive radio networks
by: Ling, Mee Hong *, et al.
Published: (2013)
by: Ling, Mee Hong *, et al.
Published: (2013)
Data Security Analysis with Advanced Firewall Filtering at PT PUSRI
by: Misinem, ., et al.
Published: (2024)
by: Misinem, ., et al.
Published: (2024)
Information security culture model for Malaysian organizations: A review
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
Fundamental of zero trust among digital employees in migration to industry 4.0: Cyber security and movement to iot in Malaysian perspectives
by: Irza Hanie, Abu Samah, et al.
Published: (2023)
by: Irza Hanie, Abu Samah, et al.
Published: (2023)
Human Resource Management System (HRMS) / Bong Mee Mee
by: Bong , Mee Mee
Published: (2001)
by: Bong , Mee Mee
Published: (2001)
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
by: Hani, Mohamed Khalil, et al.
Published: (2000)
by: Hani, Mohamed Khalil, et al.
Published: (2000)
Real-time EEG signal analysis for microsleep detection: Hyper-Opt-ANN as a key solution
by: Hassan, Md Mahmudul, et al.
Published: (2025)
by: Hassan, Md Mahmudul, et al.
Published: (2025)
A new parking guidance system for outdoor environment
by: Puviarasi, R., et al.
Published: (2019)
by: Puviarasi, R., et al.
Published: (2019)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Web-based internet security / Zuriani Karia
by: Zuriani, Karia
Published: (2003)
by: Zuriani, Karia
Published: (2003)
Development of Simulation Environment for Agent Interaction Protocol
by: Latif, N.A., et al.
Published: (2010)
by: Latif, N.A., et al.
Published: (2010)
Network security tools-firewall / Ding Khoon Chong
by: Ding, Khoon Chong
Published: (2005)
by: Ding, Khoon Chong
Published: (2005)
Software defined networking (SDN) and its security issues
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
Analysis of Information Security Resource Requirements in Local Governments
by: Toto, Suharto, et al.
Published: (2022)
by: Toto, Suharto, et al.
Published: (2022)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Secure open wireless LAN using point to point protocol
by: Guay, Wei Lin
Published: (2007)
by: Guay, Wei Lin
Published: (2007)
Web-Based Business Planning System (Analysis and Forecast)
/ How Men Mee
by: How, Men Mee
Published: (2002)
by: How, Men Mee
Published: (2002)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
Exploring manet security aspects: analysis of attacks and node misbehaviour issues
by: Islam Khan, Burhan Ul, et al.
Published: (2022)
by: Islam Khan, Burhan Ul, et al.
Published: (2022)
An advanced and secure framework for conducting online examination using blockchain method
by: Sattar, Md Rahat Ibne, et al.
Published: (2023)
by: Sattar, Md Rahat Ibne, et al.
Published: (2023)
PESAT application Personal Security Administrator Tool / Law Yong Jin
by: Law , Yong Jin
Published: (2004)
by: Law , Yong Jin
Published: (2004)
Home security system using face recognition
by: Syed Syafiq, Syed Alias, et al.
Published: (2021)
by: Syed Syafiq, Syed Alias, et al.
Published: (2021)
ANN-integrated modeling of HTL-free Cs₂SnI₆ perovskite solar cells under indoor and outdoor light spectra
by: Md Zannatul, Arif, et al.
Published: (2025)
by: Md Zannatul, Arif, et al.
Published: (2025)
Information security behaviour : a descriptive analysis on a Malaysian public university
by: Ramlah Hussein, *, et al.
Published: (2011)
by: Ramlah Hussein, *, et al.
Published: (2011)
Web based agent for transaction of mercantile-security measures / Yan Wee Jing
by: Yan , Wee Jing
Published: (2001)
by: Yan , Wee Jing
Published: (2001)
Automated intrusion prevention mechanism in enhancing network security / He Xiao Dong
by: He , Xiao Dong
Published: (2008)
by: He , Xiao Dong
Published: (2008)
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
HCI knowledge for UX practices in the web development process
by: Hussein, Idyawati, et al.
Published: (2014)
by: Hussein, Idyawati, et al.
Published: (2014)
Sensing task handover for indoor clustered wireless sensor network
by: Pu, Chuan Chin *
Published: (2011)
by: Pu, Chuan Chin *
Published: (2011)
Measuring the efficiency of MFWA technique for prioritizing event sequences test cases
by: Johanna, Ahmad, et al.
Published: (2019)
by: Johanna, Ahmad, et al.
Published: (2019)
Particle swarm optimization and spiral dynamic algorithm-based interval type-2 fuzzy logic control of triple-link inverted pendulum system : a comparative assessment
by: M. F., Masrom, et al.
Published: (2021)
by: M. F., Masrom, et al.
Published: (2021)
ARM7 Processor Simulator with Graphical User Interface
by: Khaw, Boon Chai, et al.
Published: (2007)
by: Khaw, Boon Chai, et al.
Published: (2007)
Impact of environment atmosphere on player engagement
by: Wong, Zi Ming
Published: (2024)
by: Wong, Zi Ming
Published: (2024)
Similar Items
-
Comparison between ANN and multiple linear regression models for prediction of warranty cost
by: Mohd Faaizie, Darmawan, et al.
Published: (2018) -
Virtual hairstyle studio (V-Hair) / Lee Ean Har
by: Lee , Ean Har
Published: (2003) -
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
by: Milad , Miri
Published: (2018) -
Utilize Medical Text Data to Estimate Disease Types by Using Naïve Bayes and ANN Classifier
by: Mujiono, Sadikin, et al.
Published: (2021) -
Reinforcement learning-based trust and reputation model for spectrum leasing in cognitive radio networks
by: Ling, Mee Hong *, et al.
Published: (2013)