Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
In recent years due to rapid growth of information technology and easy access to computers, digital devices and internet, security management and investigating malicious activity have been main concern of organization and governments. People who are greatest asset of organization, they may also be t...
| Main Author: | Zahedeh, Zamanian |
|---|---|
| Format: | Thesis |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/10748/ http://studentsrepo.um.edu.my/10748/1/Zahedeh.pdf http://studentsrepo.um.edu.my/10748/2/Zahedeh__%E2%80%93_Dissertation.pdf |
Similar Items
Integrating genetic algorithms and fuzzy c-means for anomaly detection
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
An adaptive wrapper algorithm for file transfer applications to support optimal large file transfers
by: Ghobadi, Alireza, et al.
Published: (2009)
by: Ghobadi, Alireza, et al.
Published: (2009)
Evaluating Machine Learning Algorithms for Fake Currency Detection
by: Keerthana, S.N, et al.
Published: (2024)
by: Keerthana, S.N, et al.
Published: (2024)
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
To identify suspicious activity in anomaly detection based on soft computing
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Machine Learning Malware Detection For Android
by: Amir Muhammad Hafiz, Othman
Published: (2022)
by: Amir Muhammad Hafiz, Othman
Published: (2022)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
by: Wasswa, Hassan
Published: (2019)
by: Wasswa, Hassan
Published: (2019)
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
by: Abdul Wahid, Mohammed N.
Published: (2016)
by: Abdul Wahid, Mohammed N.
Published: (2016)
Sending the output to a print file
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Artificial immune system based on real valued negative selection algorithms for anomaly detection
by: Khairi, Rihab Salah
Published: (2015)
by: Khairi, Rihab Salah
Published: (2015)
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Malware Detection In Android Using Machine Learning
by: Muhammad Hazriq Akmal, Zairol
Published: (2023)
by: Muhammad Hazriq Akmal, Zairol
Published: (2023)
Machine learning technique for phishing website detection
by: Nurul Amira, Mohd Zin, et al.
by: Nurul Amira, Mohd Zin, et al.
Comparative performance of machine learning algorithms for cryptocurrency forecasting
by: Hitam, Nor Azizah, et al.
Published: (2018)
by: Hitam, Nor Azizah, et al.
Published: (2018)
Mobile malware anomaly-based detection systems using static analysis features / Ahmad Firdaus Zainal Abidin
by: Ahmad Firdaus, Zainal Abidin
Published: (2017)
by: Ahmad Firdaus, Zainal Abidin
Published: (2017)
An automated strabismus classification using machine learning algorithm for binocular vision management system
by: Muhammad Amirul Isyraf, Rohismadi, et al.
Published: (2023)
by: Muhammad Amirul Isyraf, Rohismadi, et al.
Published: (2023)
Identification of ECG anomalies through deep deterministic learning / Uzair Iqbal
by: Uzair , Iqbal
Published: (2020)
by: Uzair , Iqbal
Published: (2020)
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
An improved hybrid learning approach for better anomaly detection
by: Mohamed Yassin, Warusia
Published: (2011)
by: Mohamed Yassin, Warusia
Published: (2011)
Protecting an Internet Web File using Java
by: Taha, Imad, et al.
Published: (2004)
by: Taha, Imad, et al.
Published: (2004)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004)
by: Idris, Mohd. Yazid, et al.
Published: (2004)
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Comparative performance of deep learning and machine learning algorithms on imbalanced handwritten data
by: Amri, A’inur A’fifah, et al.
Published: (2018)
by: Amri, A’inur A’fifah, et al.
Published: (2018)
Phishing Website Detection Technique Using Machine Learning
by: Nurul Amira, Mohd Zin
Published: (2022)
by: Nurul Amira, Mohd Zin
Published: (2022)
Log file analysis using signature detection (LoFA-SD)
by: Koay, Abigail May Yee
Published: (2011)
by: Koay, Abigail May Yee
Published: (2011)
Malware detection through machine learning techniques
by: Amer, Ahmed, et al.
Published: (2019)
by: Amer, Ahmed, et al.
Published: (2019)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Information hiding in multimedia files : a literature review
by: Ali Ja’far, Abdullah Mohammed Abdo, et al.
Published: (2006)
by: Ali Ja’far, Abdullah Mohammed Abdo, et al.
Published: (2006)
The impact of file sharing based on the peer-to-peer technology
by: Raja Shaharuddin, Raja Aida, et al.
Published: (2002)
by: Raja Shaharuddin, Raja Aida, et al.
Published: (2002)
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017)
by: Lu, Cai An
Published: (2017)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
Early prediction of acute kidney injury using machine learning algorithms
by: Ismail, Amelia Ritahani, et al.
Published: (2018)
by: Ismail, Amelia Ritahani, et al.
Published: (2018)
Propose a New Machine Learning Algorithm based on Cancer Diagnosis
by: Ali, Mohammed Hasan, et al.
Published: (2018)
by: Ali, Mohammed Hasan, et al.
Published: (2018)
Early Detection Of ADHD Among Children Using Machine Learning
by: Nur Atiqah, Kamal
Published: (2023)
by: Nur Atiqah, Kamal
Published: (2023)
A machine learning-based anomaly detection framework for connected and autonomous vehicles cyber security
by: He, Qiyi
Published: (2021)
by: He, Qiyi
Published: (2021)
Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb
by: Riyaz Ahamed , Ariyaluran Habeeb
Published: (2019)
by: Riyaz Ahamed , Ariyaluran Habeeb
Published: (2019)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
Similar Items
-
Integrating genetic algorithms and fuzzy c-means for anomaly detection
by: Chimphlee, Witcha, et al.
Published: (2005) -
An adaptive wrapper algorithm for file transfer applications to support optimal large file transfers
by: Ghobadi, Alireza, et al.
Published: (2009) -
Evaluating Machine Learning Algorithms for Fake Currency Detection
by: Keerthana, S.N, et al.
Published: (2024) -
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
by: Chimphlee, Witcha, et al.
Published: (2005) -
To identify suspicious activity in anomaly detection based on soft computing
by: Chimphlee, Witcha, et al.
Published: (2006)