Performance evaluation for different intrusion detection system algorithms using machine learning
Intrusion is a set of operations that decide to compromise the integrity, confidentiality, and convenience of pc resources. This definition ignores the success or failure of those operations, therefore it additionally corresponds to attacks on pc systems. The distinguishing actions that mitigate the...
| Main Author: | Zarir, Mustafa Nadhim |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/434/ http://eprints.uthm.edu.my/434/1/24p%20MUSTAFA%20NADHIM%20ZARIR.pdf http://eprints.uthm.edu.my/434/2/MUSTAFA%20NADHIM%20ZARIR%20COPYRIGHT%20DECLARATION.pdf http://eprints.uthm.edu.my/434/3/MUSTAFA%20NADHIM%20ZARIR%20WATERMARK.pdf |
Similar Items
Propose a new Firefly-Fast Learning Network
model based Intrusion-Detection System
by: Badran, Mohammed Falih, et al.
Published: (2019)
by: Badran, Mohammed Falih, et al.
Published: (2019)
A hybrid approach to intrusion detection and prevention for business intelligence applications
by: Yee, , Chan Gaik, et al.
Published: (2006)
by: Yee, , Chan Gaik, et al.
Published: (2006)
An intrusion detection system for DDoS flooding attacks on IPv6 networks using deep learning techniques
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
Study On Signature-Based Network Intrusion Detection System For High-Speed Network Using Network Processing Unit (NPU)
by: Salim, Robin
Published: (2007)
by: Salim, Robin
Published: (2007)
Machine learning techniques to detect bleeding frame and area in wireless capsule endoscopy video
by: Vajravelua, Ashok, et al.
Published: (2023)
by: Vajravelua, Ashok, et al.
Published: (2023)
Comparative evaluation of various GPS-free localization algorithm for wireless sensor networks
by: Musbahi, Amal Mustafa
Published: (2015)
by: Musbahi, Amal Mustafa
Published: (2015)
Enhancement of network security by use machine learning
by: Hasan, Ahmed Raheem
Published: (2019)
by: Hasan, Ahmed Raheem
Published: (2019)
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
by: Ayodele Nojeem, Lasisi
Published: (2018)
by: Ayodele Nojeem, Lasisi
Published: (2018)
Propose a new firefly-fast learning network model based intrusion-detection system
by: Badran, Mohammed Falih, et al.
Published: (2019)
by: Badran, Mohammed Falih, et al.
Published: (2019)
A new approach for jpeg fragmentation point detection using sequential difference by segment (SDbS)
by: T Azmi, Tengku Norsuhaila
Published: (2019)
by: T Azmi, Tengku Norsuhaila
Published: (2019)
Evaluation Of Internet Protocal Version 6 (IPV6) Implementations And Comparative Performance Analysis On Different Platforms
by: Syed Mohamed, Sulaiman
Published: (2005)
by: Syed Mohamed, Sulaiman
Published: (2005)
Algorithmic Framework For Onthology Mapping And Merging
by: Kiu, Ching Chieh
Published: (2007)
by: Kiu, Ching Chieh
Published: (2007)
Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
by: A. M., Aleesa, et al.
Published: (2020)
by: A. M., Aleesa, et al.
Published: (2020)
Energy-Efficient Routing Algorithms For Wireless Sensor Network
by: Goh, Hock Guan
Published: (2006)
by: Goh, Hock Guan
Published: (2006)
Solving security staff scheduling by using genetic algorithm
by: Ang, Shin Yin
Published: (2021)
by: Ang, Shin Yin
Published: (2021)
Efficient Call Admission Control Algorithm For CDMA Communication Systems
by: Chan , Mun Leong
Published: (2005)
by: Chan , Mun Leong
Published: (2005)
An Efficient Call Admission Control Algorithm For CDMA Communication Systems
by: Chan, Mun Leong
Published: (2005)
by: Chan, Mun Leong
Published: (2005)
Designing communication network topologies using steady-state genetic algorithms
by: Sayoud, H., et al.
Published: (2001)
by: Sayoud, H., et al.
Published: (2001)
A heuristics approach for classroom scheduling using genetic algorithm technique
by: Ahmad, Izah R., et al.
Published: (2017)
by: Ahmad, Izah R., et al.
Published: (2017)
An efficient local search heuristics for asynchronous multiuser detection
by: Lim, Heng Siong, et al.
Published: (2003)
by: Lim, Heng Siong, et al.
Published: (2003)
Selfish Nodes Detection Mechanism In Wireless Mesh Networks
by: Kai, Chong Zan
Published: (2010)
by: Kai, Chong Zan
Published: (2010)
Study On Practice Swarm Optimization Based Search Algorithms For Network Shortest Path Problems
by: W.muhemmed, Ammar
Published: (2007)
by: W.muhemmed, Ammar
Published: (2007)
A genetic local tuning algorithm for a class of combinatorial networks design problems
by: Sayoud, H., et al.
Published: (2001)
by: Sayoud, H., et al.
Published: (2001)
Evaluation Of Routing Protocols In Vanets
by: Chan, Wai Foo
Published: (2009)
by: Chan, Wai Foo
Published: (2009)
Iterative Decoding And Detection For CDMA Systems On Non-Gaussian Channels
by: Ku, Ivan Chui Choon
Published: (2006)
by: Ku, Ivan Chui Choon
Published: (2006)
Multiuser detection for DS-CDMA systems using evolutionary programming
by: Lim, H.S., et al.
Published: (2003)
by: Lim, H.S., et al.
Published: (2003)
Radio Frequency Identification (RFID) based cable detection system
by: Hasan, Syahzani Arifah, et al.
Published: (2021)
by: Hasan, Syahzani Arifah, et al.
Published: (2021)
Packet contention resolution in slotted optical packet switch using ant-colony based algorithm
by: Tan, Shing Chiang, et al.
Published: (2007)
by: Tan, Shing Chiang, et al.
Published: (2007)
Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network
by: Ahmed Al-Doori, Ahmed Jamal
Published: (2018)
by: Ahmed Al-Doori, Ahmed Jamal
Published: (2018)
Youtube spam detection framework using naïve bayes and logistic regression
by: Maulat Samsudin, Nur’Ain, et al.
Published: (2019)
by: Maulat Samsudin, Nur’Ain, et al.
Published: (2019)
A comprehensive study of distributed denial of service attack with the detection techniques
by: Ibrahim, Husam Hamid
Published: (2018)
by: Ibrahim, Husam Hamid
Published: (2018)
Development of ultra wideband antenna array for human detection under debris
by: Ali, Jawad
Published: (2018)
by: Ali, Jawad
Published: (2018)
Evaluating Usability Theory Of WWW In Malaysia
by: Wan Mohd Isa, Wan Abdul Rahim
Published: (2005)
by: Wan Mohd Isa, Wan Abdul Rahim
Published: (2005)
Semi-analytical BER performance of a direct detection soliton transmission system
by: Abbou, F. M., et al.
Published: (2006)
by: Abbou, F. M., et al.
Published: (2006)
Wavelet neural networks based solutions for elliptic partial differential equations with improved butterfly optimization algorithm training
by: Lee, Sen Tan, et al.
Published: (2020)
by: Lee, Sen Tan, et al.
Published: (2020)
POWer adaptive random early detection for DiffServ assured forwarding service classes
by: Ng,, B. K, et al.
Published: (2006)
by: Ng,, B. K, et al.
Published: (2006)
Active Queue Management Using Non-Linear Adaptive Random Early Detection Mechanism
by: Ng, Boon Kiong
Published: (2006)
by: Ng, Boon Kiong
Published: (2006)
Development of computer aided design system based on artificial neural network for macular hole detection
by: Jayapalan, Mohana Phriya
Published: (2021)
by: Jayapalan, Mohana Phriya
Published: (2021)
Performance evaluation of World Wide Web over wireless networks
by: Ahmad, Nazrul Muhaimin
Published: (2006)
by: Ahmad, Nazrul Muhaimin
Published: (2006)
Evaluation of quality of service in fourth generation wireless and mobile networks
by: Ghadeer, Sabah Hassan
Published: (2019)
by: Ghadeer, Sabah Hassan
Published: (2019)
Similar Items
-
Propose a new Firefly-Fast Learning Network
model based Intrusion-Detection System
by: Badran, Mohammed Falih, et al.
Published: (2019) -
A hybrid approach to intrusion detection and prevention for business intelligence applications
by: Yee, , Chan Gaik, et al.
Published: (2006) -
An intrusion detection system for DDoS flooding attacks on IPv6 networks using deep learning techniques
by: Ahmed Marwan, Idrees Aleesa
Published: (2021) -
Study On Signature-Based Network Intrusion Detection System For High-Speed Network Using Network Processing Unit (NPU)
by: Salim, Robin
Published: (2007) -
Machine learning techniques to detect bleeding frame and area in wireless capsule endoscopy video
by: Vajravelua, Ashok, et al.
Published: (2023)