Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb
The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which leads to cyber-attack, financial loss, information theft and cyber war. Hence, network security analytics has become an important area of concern and has gained intensive attention amo...
| Main Author: | Riyaz Ahamed , Ariyaluran Habeeb |
|---|---|
| Format: | Thesis |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/13130/ http://studentsrepo.um.edu.my/13130/2/Riyaz_Ahmed.pdf http://studentsrepo.um.edu.my/13130/1/Riyaz_Ahamed.pdf |
Similar Items
An evaluation of machine translation quality of news headlines / Luwaytha Salah Habeeb
by: Luwaytha, Salah Habeeb
Published: (2013)
by: Luwaytha, Salah Habeeb
Published: (2013)
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Scheduling divisible real-time loads on clusters with varying processor start times
by: Chuprat, Suriayati, et al.
Published: (2008)
by: Chuprat, Suriayati, et al.
Published: (2008)
Ferroresonance in capacitive voltage transformer (CVT) due to breaker opening / Shakil Ahamed Khan
by: Khan, Shakil Ahamed
Published: (2015)
by: Khan, Shakil Ahamed
Published: (2015)
Dendritic Cells for Real-Time Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Convective heat transfer in square and cylindrical porous annulus / Salman Ahamed Khan Jagirdar
by: Salman Ahamed Khan , Jagirdar
Published: (2013)
by: Salman Ahamed Khan , Jagirdar
Published: (2013)
The effect of mental imagery training in developing accuracy and speed of basic badminton skills among beginner players / Habeeb Y. Kasim
by: Y. Kasim, Habeeb
Published: (2013)
by: Y. Kasim, Habeeb
Published: (2013)
Artificial immune system based on real valued negative selection algorithms for anomaly detection
by: Khairi, Rihab Salah
Published: (2015)
by: Khairi, Rihab Salah
Published: (2015)
Geochemical characterisation of the late cretaceous coal and mudstones from gombe formation, gongola sub-basin, Northern Benue trough, Nigeria / Ayinla Habeeb Ayoola
by: Ayinla Habeeb, Ayoola
Published: (2018)
by: Ayinla Habeeb, Ayoola
Published: (2018)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
Anomaly Detection in Time Series Data Using Spiking Neural Network
by: Bariah, Yusob, et al.
Published: (2018)
by: Bariah, Yusob, et al.
Published: (2018)
The framing of BBC Arabic online news on Trump's travel bans / Dania Yahya Hamed Ibrahim Ahamed Alshershaby
by: Dania Yahya, Hamed Ibrahim Ahamed Alshershaby
Published: (2019)
by: Dania Yahya, Hamed Ibrahim Ahamed Alshershaby
Published: (2019)
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017)
by: Lu, Cai An
Published: (2017)
Denaturation behavior and conformational states of champedak galactose-binding lectin under various denaturing conditions / Nurul Iman Ahamed Kameel
by: Nurul Iman , Ahamed Kameel
Published: (2018)
by: Nurul Iman , Ahamed Kameel
Published: (2018)
Integrating genetic algorithms and fuzzy c-means for anomaly detection
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
To identify suspicious activity in anomaly detection based on soft computing
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
A real time vein detection system
by: Ahmed, Kazi Istiaque, et al.
Published: (2018)
by: Ahmed, Kazi Istiaque, et al.
Published: (2018)
Real-time human detection for video surveillance
by: Kamru Zaman, Fadhlan H., et al.
Published: (2011)
by: Kamru Zaman, Fadhlan H., et al.
Published: (2011)
Real-time hand detection by depth images: a survey
by: Karbasi, Mostafa, et al.
Published: (2016)
by: Karbasi, Mostafa, et al.
Published: (2016)
Framework for real time cloud rendering
by: Rana, Muhammad Azam, et al.
Published: (2004)
by: Rana, Muhammad Azam, et al.
Published: (2004)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
by: Wasswa, Hassan
Published: (2019)
by: Wasswa, Hassan
Published: (2019)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
Real Time Water Level Detection Systems for Water Treatment Plant
by: Mohd Burhanuddin, Hamzah, et al.
Published: (2016)
by: Mohd Burhanuddin, Hamzah, et al.
Published: (2016)
Iot-Based Real-Time Landslide Detection Using Fuzzy Logic
by: Nur Tihani Faqihah, Nuruddin Kamal
Published: (2023)
by: Nur Tihani Faqihah, Nuruddin Kamal
Published: (2023)
An improved hybrid learning approach for better anomaly detection
by: Mohamed Yassin, Warusia
Published: (2011)
by: Mohamed Yassin, Warusia
Published: (2011)
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)
by: Salah, Mohammad
Published: (2017)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Real-time whiteboard / Ng Yih Young
by: Ng , Yih Young
Published: (2002)
by: Ng , Yih Young
Published: (2002)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Real time astrocyte in spiking neural network
by: Abdul-Rahman Abed, Bassam, et al.
Published: (2015)
by: Abdul-Rahman Abed, Bassam, et al.
Published: (2015)
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Smartphone aided real-time blood vein detection system
by: Ahmed, Kazi Istiaque, et al.
Published: (2019)
by: Ahmed, Kazi Istiaque, et al.
Published: (2019)
Real-Time Object Detection System for Hospital Assets Using YOLOv8
by: Andalusia, Friska, et al.
Published: (2024)
by: Andalusia, Friska, et al.
Published: (2024)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Real time gesture recognition system for ADAS
by: Chee, Ying Xuan
Published: (2018)
by: Chee, Ying Xuan
Published: (2018)
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
by: Zahedeh, Zamanian
Published: (2019)
by: Zahedeh, Zamanian
Published: (2019)
Similar Items
-
An evaluation of machine translation quality of news headlines / Luwaytha Salah Habeeb
by: Luwaytha, Salah Habeeb
Published: (2013) -
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
by: Chimphlee, Witcha, et al.
Published: (2005) -
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006) -
Scheduling divisible real-time loads on clusters with varying processor start times
by: Chuprat, Suriayati, et al.
Published: (2008) -
Ferroresonance in capacitive voltage transformer (CVT) due to breaker opening / Shakil Ahamed Khan
by: Khan, Shakil Ahamed
Published: (2015)