A machine learning based AIS IDS.
In recent years we have seen a very great interest in combining naturally inspired techniques with existing conventional approaches. In this study we combined Negative Selection theory, one of most important theories in AIS, and knowledge production rules to propose a novel IDS. To generate the dete...
| Main Authors: | Mahboubian, Mohammad, Abdul Hamid, Nor Asila Wati |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
IACSIT Press
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/30694/ http://psasir.upm.edu.my/id/eprint/30694/1/A%20machine%20learning%20based%20AIS%20IDS.pdf |
Similar Items
How AIS Addresses Adaptability in IDS
by: Zainal, Anazida, et al.
Published: (2005)
by: Zainal, Anazida, et al.
Published: (2005)
'Danger Theory: The Link between AIS and IDS?'
by: Aickelin, Uwe, et al.
Published: (2003)
by: Aickelin, Uwe, et al.
Published: (2003)
'Danger Theory: The Link between AIS and IDS?'
by: Aickelin, Uwe, et al.
Published: (2003)
by: Aickelin, Uwe, et al.
Published: (2003)
Danger theory: the link between AIS and IDS?
by: Aickelin, Uwe, et al.
Published: (2003)
by: Aickelin, Uwe, et al.
Published: (2003)
Intrusion detection system (IDS) using machine learning
by: Tan, May May
Published: (2024)
by: Tan, May May
Published: (2024)
An alert fusion model inspired by artificial immune system.
by: Mahboubian, Mohammad, et al.
Published: (2012)
by: Mahboubian, Mohammad, et al.
Published: (2012)
AI based power allocation for NOMA
by: Manglayev, Talgat, et al.
Published: (2022)
by: Manglayev, Talgat, et al.
Published: (2022)
Arabic ID-DGBL :an instructional design (ID)
model for e-arabic teaching and learning
by: Sahrir, Muhammad Sabri, et al.
Published: (2012)
by: Sahrir, Muhammad Sabri, et al.
Published: (2012)
A Cluster-Based Distributed Hierarchical IDS for MANETs
by: B., Pahlevanzadesh, et al.
Published: (2008)
by: B., Pahlevanzadesh, et al.
Published: (2008)
Exploring artificial intelligence(AI) for machine automation
by: Meow, Mervyn Zi Yang
Published: (2019)
by: Meow, Mervyn Zi Yang
Published: (2019)
Implications for ID practice of Instructional Designers' Cultural Identities
by: Campbell, Kathy, et al.
Published: (2009)
by: Campbell, Kathy, et al.
Published: (2009)
Registration for Single ID Guide
by: Mohd Hamizan, Baki
Published: (2016)
by: Mohd Hamizan, Baki
Published: (2016)
CASI Method for Improving the Usability of IDS
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
AI techniques in the implementation of distance learning: A proposal
by: Mohd. Yasin, Noraniah, et al.
Published: (2000)
by: Mohd. Yasin, Noraniah, et al.
Published: (2000)
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
by: Ibrahim, Hamidah, et al.
Published: (2014)
by: Ibrahim, Hamidah, et al.
Published: (2014)
MicroRNAs and intellectual disability (ID) in Down syndrome, X-linked ID and Fragile X syndrome
by: Siew, Wei Hong, et al.
Published: (2013)
by: Siew, Wei Hong, et al.
Published: (2013)
UPM bangunkan Putra Virtual ID
by: Utusan Malaysia
Published: (2018)
by: Utusan Malaysia
Published: (2018)
CatIDS: Using market-based mechanism as a tool for protection by adaptation
by: Hassan, S., et al.
Published: (2005)
by: Hassan, S., et al.
Published: (2005)
Qawa'id Usuliyyah/Al-Qawa'id Al-Usuliyyah : Final exam semester I 2016/2017
Dog voice identification (ID) for detection system
by: Yeo, Che Yong, et al.
Published: (2012)
by: Yeo, Che Yong, et al.
Published: (2012)
A feedback based prediction model for real time workload in a cloud
by: Ghouchani, Babak Esmaeilpour, et al.
Published: (2016)
by: Ghouchani, Babak Esmaeilpour, et al.
Published: (2016)
A naturally inspired statistical intrusion detection model
by: Mahboubian, Mohammad, et al.
Published: (2013)
by: Mahboubian, Mohammad, et al.
Published: (2013)
Distributed Hierarchical IDS For MANET Over AODV+.
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
An intrusion detection system (IDS) for internet network
by: Safiee, Mohd. Fauzan
Published: (2007)
by: Safiee, Mohd. Fauzan
Published: (2007)
Introduction to the Heijkoop approach to challenging behaviour in ID
by: Heijkoop, Jacques, et al.
Published: (2012)
by: Heijkoop, Jacques, et al.
Published: (2012)
International Doris Service (IDS): Data and Products
by: Allahvirdizadeh, Amir
Published: (2012)
by: Allahvirdizadeh, Amir
Published: (2012)
Accounting learning package / Wong Ai Yieng
by: Wong, Ai Yieng
Published: (2001)
by: Wong, Ai Yieng
Published: (2001)
Research on the mechanism of AI service satisfaction based on the culture and AI strategy perspective.
by: Du, Shi-Qi
Published: (2020)
by: Du, Shi-Qi
Published: (2020)
Research on the mechanism of AI service satisfaction based on the culture and AI strategy perspective.
by: Du, Shiqi
Published: (2020)
by: Du, Shiqi
Published: (2020)
Research on the mechanism of AI service satisfaction based on the culture and AI strategy perspective.
by: Du, Shiqi
Published: (2020)
by: Du, Shiqi
Published: (2020)
Animal voice recognition for identification (ID) detection system
by: Yeo, Che Yong, et al.
Published: (2011)
by: Yeo, Che Yong, et al.
Published: (2011)
Finding granular features using rough-PSO in IDS
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Similar Items
-
How AIS Addresses Adaptability in IDS
by: Zainal, Anazida, et al.
Published: (2005) -
'Danger Theory: The Link between AIS and IDS?'
by: Aickelin, Uwe, et al.
Published: (2003) -
'Danger Theory: The Link between AIS and IDS?'
by: Aickelin, Uwe, et al.
Published: (2003) -
Danger theory: the link between AIS and IDS?
by: Aickelin, Uwe, et al.
Published: (2003) -
Intrusion detection system (IDS) using machine learning
by: Tan, May May
Published: (2024)