Rough Set Significant Reduct and Rules of Intrusion Detection System
Intrusion Detection System deals with huge amount of data which contains irrelevant and redundant features causing slow training and testing process, also higher resource consumption as well as poor detection rate. It is not simply removing these irrelevant or redundant features due to deteriorate...
| Main Authors: | Noor Suhana, Sulaiman, Rohani, Abu Bakar |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Digital Information Research Foundation, India
2017
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/21202/ http://umpir.ump.edu.my/id/eprint/21202/1/jisrv8n1_3-1.pdf |
Similar Items
Rough Set Significant Reduction and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Rough Set Discretize Classification of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Generation of rough set (RS) significant reducts and rules for cardiac dataset classification
by: Sulaiman, Noor Suhana
Published: (2007)
by: Sulaiman, Noor Suhana
Published: (2007)
Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019)
by: Noor Suhana, Sulaiman
Published: (2019)
Fuzzy rules reduction using rough set approach
by: Yusof, Norazah, et al.
Published: (2003)
by: Yusof, Norazah, et al.
Published: (2003)
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
A Review on Soft Computing Technique in Intrusion Detection System
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
by: Wasswa, Hassan
Published: (2019)
by: Wasswa, Hassan
Published: (2019)
Review on Intrusion Detection System Based on The Goal of The Detection System
by: Khaleel, M. K., et al.
Published: (2018)
by: Khaleel, M. K., et al.
Published: (2018)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Intrusion Detection Systems, Issues, Challenges, and Needs
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Relation between Significance of Attribute Set and Single Attribute
by: Ma, Xiuqin, et al.
Published: (2010)
by: Ma, Xiuqin, et al.
Published: (2010)
Hot-based intrusion detection system (HIDS)
by: Zaid Affendi, Zainol
Published: (2005)
by: Zaid Affendi, Zainol
Published: (2005)
Towards the Selection of Best Neural Network System for Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
On the vital areas of intrusion detection systems in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2012)
by: Abduvaliyev, Abror, et al.
Published: (2012)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
A set of embedding rules in IWT for watermark embedding in image watermarking
by: Muhammad Afnan, Hafidz, et al.
Published: (2024)
by: Muhammad Afnan, Hafidz, et al.
Published: (2024)
comparative Analysis of Intrusion Detection Approaches
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
The state of the art in intrusion prevention and detection
Published: (2014)
Published: (2014)
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
A survey on MANET intrusion detection
by: Mandala, Satria, et al.
Published: (2008)
by: Mandala, Satria, et al.
Published: (2008)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Rough Set Granularity in Mobile Web Pre-Caching
by: Sulaiman, Sarina, et al.
by: Sulaiman, Sarina, et al.
Rough sets theory for travel demand analysis in Malaysia
by: Wong, Jenn Hwee
Published: (2008)
by: Wong, Jenn Hwee
Published: (2008)
Analysis and design of intrusion detection system implementation / Chia Fook Keong
by: Chia, Fook Keong
Published: (2003)
by: Chia, Fook Keong
Published: (2003)
Improved hybrid intelligent intrusion detection system using AI technique
by: Shanmugam, Bharanidharan, et al.
Published: (2007)
by: Shanmugam, Bharanidharan, et al.
Published: (2007)
Investigating Supervised Neural Networks to Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Intrusion detection and prevention in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2013)
by: Abduvaliyev, Abror, et al.
Published: (2013)
Applying Rough Set Theory for Student Clustering on Assessment Datasets
by: Suhirman, na, et al.
Published: (2013)
by: Suhirman, na, et al.
Published: (2013)
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
by: Shamshirband, Shahaboddin
Published: (2014)
by: Shamshirband, Shahaboddin
Published: (2014)
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
by: Dahlan, Dahliyusmanto
Published: (2004)
by: Dahlan, Dahliyusmanto
Published: (2004)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
A survey of intrusion detection system using case study Kuwait governments entiteis
by: Alenezi, Khalid, et al.
Published: (2014)
by: Alenezi, Khalid, et al.
Published: (2014)
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
by: Ali, Mohammed Hasan, et al.
Published: (2019)
by: Ali, Mohammed Hasan, et al.
Published: (2019)
Similar Items
-
Rough Set Significant Reduction and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016) -
Rough Set Discretize Classification of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016) -
Generation of rough set (RS) significant reducts and rules for cardiac dataset classification
by: Sulaiman, Noor Suhana
Published: (2007) -
Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
by: Noor Suhana, Sulaiman, et al.
Published: (2017) -
Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
by: Noor Suhana, Sulaiman, et al.
Published: (2016)