Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
The increasing speed of today’s computer networks directly affects the performance of Network Intrusion Detection Systems (NIDS) in terms of speed of detection of threats. Therefore, the performance of the existing algorithms needs to be improved both in sequential and parallel to enhance the speed...
| Main Author: | Hnaif, Adnan Ahmad Abdelfattah |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/42719/ http://eprints.usm.my/42719/1/ADNAN_AHMAD_ABDELFATTAH_HNAIF.pdf |
Similar Items
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006)
by: Robin Salim,, et al.
Published: (2006)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
Bipartite Graph Algorithm With Reference Frame Representation For Protein Tertiary Structure Matching
by: Othman, Fazilah
Published: (2010)
by: Othman, Fazilah
Published: (2010)
Parallel Quick-Skip Search Hybrid Algorithm For The Exact String Matching Problem.
by: Naser, Mustafa Abdulsahib
Published: (2010)
by: Naser, Mustafa Abdulsahib
Published: (2010)
Application Of Exact String Matching Algorithms Towards SMILES Representation Of Chemical Structure.
by: Klaib, Ahmad Fadel, et al.
Published: (2007)
by: Klaib, Ahmad Fadel, et al.
Published: (2007)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
Simple Knit Design System; Using Pattern Matching.
by: Budiarto, Rahmat, et al.
Published: (2002)
by: Budiarto, Rahmat, et al.
Published: (2002)
Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM based Intrusion Detection Sensors
by: Jazzar, Mahmoud, et al.
by: Jazzar, Mahmoud, et al.
A Feature Selection Approach for Network Intrusion Detection
by: Khor, Kok-Chin, et al.
Published: (2009)
by: Khor, Kok-Chin, et al.
Published: (2009)
A Scalable QoS Scheduling Architecture For WiMAX Multi-Hop Relay Networks.
by: Tat, Chee Wan, et al.
Published: (2010)
by: Tat, Chee Wan, et al.
Published: (2010)
Statistical Analysis of Video Frame Size Distribution
Originating from Scalable Video Codec (SVC)
by: Ahmadpour, Sima, et al.
Published: (2017)
by: Ahmadpour, Sima, et al.
Published: (2017)
Vehicle Monitoring System Using Motion Detection Algorithms For USM Campus.
by: Osman, Mohd. Azam, et al.
Published: (2007)
by: Osman, Mohd. Azam, et al.
Published: (2007)
Passive operating system fingerprinting based on multi-layered sub-signature matching scheme (MLSMS).
by: Aljammal, Ashraf Hamdan Rashid
Published: (2011)
by: Aljammal, Ashraf Hamdan Rashid
Published: (2011)
Enhanced Statistical Modelling For Variable Bit Rate Video Traffic Generated From Scalable Video Codec
by: Ahmadpour, Sima
Published: (2016)
by: Ahmadpour, Sima
Published: (2016)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
Parallelizing Algorithm For Object Recognition Based On Edge Detection On Sunfire Cluster.
by: Osman, Mohd Azam, et al.
Published: (2007)
by: Osman, Mohd Azam, et al.
Published: (2007)
Error-resilient transmission of resolution-scalable image and video over wireless channels
by: Al Muhit, Abdullah, et al.
Published: (2006)
by: Al Muhit, Abdullah, et al.
Published: (2006)
Variability analysis of impedance matching network
by: CHUNG, B
Published: (2006)
by: CHUNG, B
Published: (2006)
Context Aware Handover Algorithms For Mobile Positioning Systems
by: Zaman Khan, Sazid, et al.
Published: (2014)
by: Zaman Khan, Sazid, et al.
Published: (2014)
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
by: Sallim, Jamaludin
Published: (2017)
by: Sallim, Jamaludin
Published: (2017)
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
by: SALLIM, JAMALUDIN
Published: (2017)
by: SALLIM, JAMALUDIN
Published: (2017)
Predictive call admission control algorithm for power-controlled wireless systems
by: Chin, Choong Ming, et al.
Published: (2006)
by: Chin, Choong Ming, et al.
Published: (2006)
Automated Federation Of Virtual Organization In Grid Using Select, Match, Negotiate And Expand (SMNE) Protocol [QA76.9.C58 C518 2008 f rb].
by: Cheng, Wai Khuen
Published: (2007)
by: Cheng, Wai Khuen
Published: (2007)
Optimizing Adaptive Neuro Fuzzy Inference System (Anfis) With Dragonfly Algorithm For Cardiovascular Disease
by: Jinjiri, Wada Mohammed
Published: (2023)
by: Jinjiri, Wada Mohammed
Published: (2023)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Off-line signature verification and forgery detection system based on fuzzy modeling
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
Efficient Block-based Matching for Content-based Retrieval of CT Head Images
by: Ahmad Fauzi, Mohammad Faizal, et al.
Published: (2008)
by: Ahmad Fauzi, Mohammad Faizal, et al.
Published: (2008)
Robust chip-matched myriad filter-based multiuser receiver for impulsive channels
by: LIM, H, et al.
Published: (2008)
by: LIM, H, et al.
Published: (2008)
Pair Bonds In Genetic Algorithm
by: Lim , Ting Yee
Published: (2015)
by: Lim , Ting Yee
Published: (2015)
A system of microcalcifications detection and evaluation of the radiologist: comparative study of the three main races in Malaysia
by: Al-Qdah,, M, et al.
Published: (2005)
by: Al-Qdah,, M, et al.
Published: (2005)
CPT212 – Design & Analysis of Algorithms
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
New hybrid genetic operators for real coded genetic algorithm to compute optimal control of a class of hybrid systems
by: ARUMUGAM, M, et al.
Published: (2005)
by: ARUMUGAM, M, et al.
Published: (2005)
A Social Based Model For Genetic Algorithms.
by: AL-Madi, Nagham Azmi, et al.
Published: (2007)
by: AL-Madi, Nagham Azmi, et al.
Published: (2007)
Adapting Artificial Immune Algorithms For University Timetabling
by: Malim , Muhammad Rozi
Published: (2009)
by: Malim , Muhammad Rozi
Published: (2009)
Protein Conformantional Search Using Bees Algorithm
by: Bahamish, Hesham Awadh A., et al.
Published: (2008)
by: Bahamish, Hesham Awadh A., et al.
Published: (2008)
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)
by: Eid, Almazrooie Mishal
Published: (2018)
Similar Items
-
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023) -
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006) -
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011) -
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011) -
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)