A lightweight host-based intrusion detection system using N-gram and perceptron model for internet of things / Belal Sudqi Abed Saleh Khater
A Host-Based Intrusion Detection System (HIDS) is a system that monitors and analyses internal or external data to detect intrusion. It is installed in a host capable of monitoring users’ activities, which is not possible in a network-based system. In this thesis, a HIDS using Modified Vector Space...
| Main Author: | Belal Sudqi Abed , Saleh Khater |
|---|---|
| Format: | Thesis |
| Published: |
2021
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/14686/ http://studentsrepo.um.edu.my/14686/2/Belal_Sudqi.pdf http://studentsrepo.um.edu.my/14686/1/Belal_Sudqi.pdf |
Similar Items
Fuzzy sliding mode control for cart Inverted Pendulum system / Belal Ahmed Abdelaziz Elsayed
by: Belal Ahmed, Abdelaziz Elsayed
Published: (2013)
by: Belal Ahmed, Abdelaziz Elsayed
Published: (2013)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
Performance evaluation of lightweight Crypto functions for Internet of things applications
by: Jaleel, Nubila, et al.
Published: (2020)
by: Jaleel, Nubila, et al.
Published: (2020)
A survey on supervised machine learning in intrusion detection systems for Internet of Things
by: Shakirah, Saidin, et al.
Published: (2023)
by: Shakirah, Saidin, et al.
Published: (2023)
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
by: Ghanem, Waheed Ali H. M., et al.
Published: (2020)
by: Ghanem, Waheed Ali H. M., et al.
Published: (2020)
Thematic progression and rhetorical structure in opinion articles of an online Iraqi English newspaper / Nadia Abed Shakeh
by: Abed Shakeh, Nadia
Published: (2014)
by: Abed Shakeh, Nadia
Published: (2014)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
A novel multi-agent and multilayered game formulation for Intrusion Detection in Internet of Things (IoT)
by: Khan, Burhan Ul Islam, et al.
Published: (2020)
by: Khan, Burhan Ul Islam, et al.
Published: (2020)
Classification of COVID-19 symptoms using multilayer perceptron
by: Nurulain Nusrah, Mohd Azam, et al.
Published: (2023)
by: Nurulain Nusrah, Mohd Azam, et al.
Published: (2023)
Syntactic avoidance in the oral production of Arab EFL learners / Tariq Monther Abed Al Hameed Al Damen
by: Al Damen, Tariq Monther Abed Al Hameed
Published: (2013)
by: Al Damen, Tariq Monther Abed Al Hameed
Published: (2013)
Self-organizing map and multilayer perceptron for malay speech recognition
by: Goh, Kia Eng
Published: (2006)
by: Goh, Kia Eng
Published: (2006)
Durability characteristics of self-consolidating high strength concrete containing ground palm oil fuel ash as a partial cement replacement / Belal Gamal Muthanna Alsubari
by: Belal Gamal, Muthanna Alsubari
Published: (2015)
by: Belal Gamal, Muthanna Alsubari
Published: (2015)
Pemindaan Perkara 9 perlembagaan Jepun dalam pentadbiran Shinzo Abe
by: Asmadi Hassan,, et al.
Published: (2017)
by: Asmadi Hassan,, et al.
Published: (2017)
Production of abe (acetone-butanol-ethanol) from pome by clostridium beijerinckii
by: Nur Akmalina, Azeman
Published: (2013)
by: Nur Akmalina, Azeman
Published: (2013)
The prediction of undergraduate student performance in chemistry course using multilayer perceptron
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
An automated signature generation method for zero-day polymorphic worms based on multilayer perceptron model
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2013)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2013)
AI-Enabled Deep Learning Model for COVID-19 Identification Leveraging Internet of Things
by: Mohd Arfian, Ismail, et al.
Published: (2023)
by: Mohd Arfian, Ismail, et al.
Published: (2023)
An improved multilayer perceptron based on wavelet approach for physical time series prediction
by: Ali, Ashikin
Published: (2014)
by: Ali, Ashikin
Published: (2014)
Malware detection using n-gram with TF-IDF weighting
by: Natasha, Zainal
Published: (2018)
by: Natasha, Zainal
Published: (2018)
The effect of technical factors on acceptance of using mobile learning: An extended model / Saud Saleh Alghazi
by: Saud Saleh , Alghazi
Published: (2021)
by: Saud Saleh , Alghazi
Published: (2021)
Improving PRESENT lightweight algorithms
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
Short-term Gini coefficient estimation using nonlinear autoregressive multilayer perceptron model
by: Megat Syahirul Amin, Megat Ali, et al.
Published: (2024)
by: Megat Syahirul Amin, Megat Ali, et al.
Published: (2024)
comparative Analysis of Intrusion Detection Approaches
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Defending against wireless network intrusion
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
The state of the art in intrusion prevention and detection
Published: (2014)
Published: (2014)
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
A survey on MANET intrusion detection
by: Mandala, Satria, et al.
Published: (2008)
by: Mandala, Satria, et al.
Published: (2008)
Identifying the Dominant Language of Web Page Using Supervised N-grams
by: Ng, Choon-Ching, et al.
Published: (2013)
by: Ng, Choon-Ching, et al.
Published: (2013)
A comprehensive analysis of intrusion detection system in internet of things
by: Teh, Boon Seong
Published: (2020)
by: Teh, Boon Seong
Published: (2020)
Rule extraction from multi-layer perceptron neural network using decision tree for currency exchange rates forecasting
by: Soleh, Ardiansyah
Published: (2015)
by: Soleh, Ardiansyah
Published: (2015)
Corpus analysis of the preposition of in Ice Nigeria
/ Saleh Bagudu Rimi
by: Rimi, Saleh Bagudu
Published: (2015)
by: Rimi, Saleh Bagudu
Published: (2015)
Adaboost-multilayer perceptron to predict the student’s performance in software engineering
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2019)
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2019)
Predicting churn: how multilayer perceptron method can help with customer retention in telecom industry
by: Nilam Nur Amir, Sjarif, et al.
Published: (2020)
by: Nilam Nur Amir, Sjarif, et al.
Published: (2020)
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Enhancement of lightweight block cipher algorithms
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Internet of things for indoor farming
by: Chong, Kai Chian
Published: (2018)
by: Chong, Kai Chian
Published: (2018)
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
CCS527 – Internet Of Things
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
Investigating Supervised Neural Networks to Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Intrusion detection and prevention in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2013)
by: Abduvaliyev, Abror, et al.
Published: (2013)
Similar Items
-
Fuzzy sliding mode control for cart Inverted Pendulum system / Belal Ahmed Abdelaziz Elsayed
by: Belal Ahmed, Abdelaziz Elsayed
Published: (2013) -
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016) -
Performance evaluation of lightweight Crypto functions for Internet of things applications
by: Jaleel, Nubila, et al.
Published: (2020) -
A survey on supervised machine learning in intrusion detection systems for Internet of Things
by: Shakirah, Saidin, et al.
Published: (2023) -
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
by: Ghanem, Waheed Ali H. M., et al.
Published: (2020)