Analysis and design of intrusion detection system implementation / Chia Fook Keong
Nowadays, firewall has been widely used to enforce network security policy in organizations. However, maintaining a good and up to date security policy is not an easy task. Furthermore, maintaining a firewall is even harder. A slip of mouse will let the hackers to drive through the firewall easily....
| Main Author: | Chia, Fook Keong |
|---|---|
| Format: | Thesis |
| Published: |
2003
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/10010/ http://studentsrepo.um.edu.my/10010/1/Chia_Fook_Keong.pdf |
Similar Items
Paralympic Sport Management System (PSMS) / Chan Foo Keong
by: Chan , Foo Keong
Published: (2001)
by: Chan , Foo Keong
Published: (2001)
Client/server connection establishing and configuration / Loo Chee Keong
by: Loo , Chee Keong
Published: (2002)
by: Loo , Chee Keong
Published: (2002)
Implementing traffic conditioner using token bucket and leaky bucket / Chia Kai Yan
by: Chia , Kai Yan
Published: (2004)
by: Chia , Kai Yan
Published: (2004)
E-Lecture online system / Lee Boon Keong
by: Lee, Boon Keong
Published: (2003)
by: Lee, Boon Keong
Published: (2003)
University of Malaya's electronic procurement system (UMEPS) Version 3.0 / Chia Wee Leng
by: Chia , Wee Leng
Published: (2001)
by: Chia , Wee Leng
Published: (2001)
comparative Analysis of Intrusion Detection Approaches
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Review on Intrusion Detection System Based on The Goal of The Detection System
by: Khaleel, M. K., et al.
Published: (2018)
by: Khaleel, M. K., et al.
Published: (2018)
Intrusion Detection Systems, Issues, Challenges, and Needs
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Student Information System (online course registration system) / Har Wai Keong
by: Har , Wai Keong
Published: (2000)
by: Har , Wai Keong
Published: (2000)
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
by: Dahlan, Dahliyusmanto
Published: (2004)
by: Dahlan, Dahliyusmanto
Published: (2004)
Intelligent tutoring system using interactive agent (Echem) / Loo Hoi Keong
by: Loo , Hoi Keong
Published: (2004)
by: Loo , Hoi Keong
Published: (2004)
Rough Set Discretize Classification of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks
by: Ahmad, Iftikhar, et al.
Published: (2010)
by: Ahmad, Iftikhar, et al.
Published: (2010)
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006)
by: Robin Salim,, et al.
Published: (2006)
Hot-based intrusion detection system (HIDS)
by: Zaid Affendi, Zainol
Published: (2005)
by: Zaid Affendi, Zainol
Published: (2005)
Towards the Selection of Best Neural Network System for Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
On the vital areas of intrusion detection systems in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2012)
by: Abduvaliyev, Abror, et al.
Published: (2012)
A Review on Soft Computing Technique in Intrusion Detection System
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
Rough Set Significant Reduct and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
The state of the art in intrusion prevention and detection
Published: (2014)
Published: (2014)
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
A survey on MANET intrusion detection
by: Mandala, Satria, et al.
Published: (2008)
by: Mandala, Satria, et al.
Published: (2008)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
3D GUI / Foong Chia Ming
by: Foong , Chia Ming
Published: (2003)
by: Foong , Chia Ming
Published: (2003)
Improved hybrid intelligent intrusion detection system using AI technique
by: Shanmugam, Bharanidharan, et al.
Published: (2007)
by: Shanmugam, Bharanidharan, et al.
Published: (2007)
Investigating Supervised Neural Networks to Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Intrusion detection and prevention in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2013)
by: Abduvaliyev, Abror, et al.
Published: (2013)
Analysis of an intrusion detection system based on immunilogy
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
Trends in IoT intrusion detection: A bibliometric analysis of deep learning approaches
by: Amir Muhammad Hafiz, Othman, et al.
Published: (2025)
by: Amir Muhammad Hafiz, Othman, et al.
Published: (2025)
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
by: Shamshirband, Shahaboddin
Published: (2014)
by: Shamshirband, Shahaboddin
Published: (2014)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
A survey of intrusion detection system using case study Kuwait governments entiteis
by: Alenezi, Khalid, et al.
Published: (2014)
by: Alenezi, Khalid, et al.
Published: (2014)
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
by: Ali, Mohammed Hasan, et al.
Published: (2019)
by: Ali, Mohammed Hasan, et al.
Published: (2019)
A novel energy-efficient sybil node detection algorithm for intrusion detection system in wireless sensor networks
by: Karuppiah, A. Babu, et al.
Published: (2014)
by: Karuppiah, A. Babu, et al.
Published: (2014)
Immune Multi Agent System for Intrusion Prevention and Self healing System Implement a Non-Linear Classification
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Artificial Neural Network Approaches to Intrusion Detection: A Review
Published: (2009)
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, Iftikhar
Published: (2009)
by: Ahmad, Iftikhar
Published: (2009)
Similar Items
-
Paralympic Sport Management System (PSMS) / Chan Foo Keong
by: Chan , Foo Keong
Published: (2001) -
Client/server connection establishing and configuration / Loo Chee Keong
by: Loo , Chee Keong
Published: (2002) -
Implementing traffic conditioner using token bucket and leaky bucket / Chia Kai Yan
by: Chia , Kai Yan
Published: (2004) -
E-Lecture online system / Lee Boon Keong
by: Lee, Boon Keong
Published: (2003) -
University of Malaya's electronic procurement system (UMEPS) Version 3.0 / Chia Wee Leng
by: Chia , Wee Leng
Published: (2001)