Propose a new Firefly-Fast Learning Network model based Intrusion-Detection System
Currently, effective Intrusion-detection systems (IDS) still represent one of the important security tools. However, hybrid models based on the IDS achieve better results compared with intrusion detection based on a single algorithm. But even so, the hybrid models based on traditional algorithms...
| Main Authors: | Badran, Mohammed Falih, Moorthy, Kohbalan, Zukifi, Nor Saradatul Akmar, Mohamad, Mohd Saberi, Deris, Safaai, Md.Sahar, Nan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Blue Eyes Intelligence Engineering & Sciences Publication
2019
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/704/ http://eprints.uthm.edu.my/704/1/DNJ9727_7d7fc08ded10dafb3d6ff412d15ccc31.pdf |
Similar Items
Propose a new firefly-fast learning network model based intrusion-detection system
by: Badran, Mohammed Falih, et al.
Published: (2019)
by: Badran, Mohammed Falih, et al.
Published: (2019)
Propose a new Firefly-Fast Learning Network model based Intrusion-Detection System
by: Mohammed Falih, Badran, et al.
Published: (2019)
by: Mohammed Falih, Badran, et al.
Published: (2019)
Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
by: A. M., Aleesa, et al.
Published: (2020)
by: A. M., Aleesa, et al.
Published: (2020)
A hybrid approach to intrusion detection and prevention for business intelligence applications
by: Yee, , Chan Gaik, et al.
Published: (2006)
by: Yee, , Chan Gaik, et al.
Published: (2006)
Performance evaluation for different intrusion detection system algorithms using machine learning
by: Zarir, Mustafa Nadhim
Published: (2018)
by: Zarir, Mustafa Nadhim
Published: (2018)
An intrusion detection system for DDoS flooding attacks on IPv6 networks using deep learning techniques
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
Study On Signature-Based Network Intrusion Detection System For High-Speed Network Using Network Processing Unit (NPU)
by: Salim, Robin
Published: (2007)
by: Salim, Robin
Published: (2007)
Development of an integrated control system for rescue boat
by: Muhammad Razif, Muhammad Rusydi, et al.
Published: (2020)
by: Muhammad Razif, Muhammad Rusydi, et al.
Published: (2020)
Single-switch bridgeless PFC sepic with proposed series-line-diodes-clamped configuration for data communication applications
by: Romai Noor, Mohd Kamil
Published: (2019)
by: Romai Noor, Mohd Kamil
Published: (2019)
Adaptive MIMO-OFDM combining space-time block codes and spatial multiplexing in correlated frequency-selective channels
by: Halmi, Mohd Hairi
Published: (2005)
by: Halmi, Mohd Hairi
Published: (2005)
Providing Quality Of Service In IEEE 802.11 Wireless Local Area Network (WLAN)
by: Ng, Bryan Cheng Kuan
Published: (2005)
by: Ng, Bryan Cheng Kuan
Published: (2005)
A Case Study Of Redtone International Berhad
by: Mustafa, Muhamad Sabri
Published: (2005)
by: Mustafa, Muhamad Sabri
Published: (2005)
Wavelength Converters Placement In All Optical Networks Using Particle Swarm Optimization
by: Teo , Choon Fang
Published: (2005)
by: Teo , Choon Fang
Published: (2005)
A Case Study Of SOHU
by: Kui, Zhang Wen
Published: (2005)
by: Kui, Zhang Wen
Published: (2005)
Analysis Of Deflection Routing Multihop Lightwave Networks With Limited Number Of Wavelength Converters
by: Koa , Chong Gee
Published: (2005)
by: Koa , Chong Gee
Published: (2005)
Strategic Implications Of Multimedia Messaging Services (MMS) : Identifying The Opportunities
by: Wu, Chin Gang
Published: (2005)
by: Wu, Chin Gang
Published: (2005)
Usability Study Of Websites From The Perspective Of Student Internet Users
by: Jeyakuma, Robert
Published: (2005)
by: Jeyakuma, Robert
Published: (2005)
Analysis And Design Of Active Grating-Embedded Optical Filters
by: Lim , Kian Yong
Published: (2005)
by: Lim , Kian Yong
Published: (2005)
Evaluation Of Internet Protocal Version 6 (IPV6) Implementations And Comparative Performance Analysis On Different Platforms
by: Syed Mohamed, Sulaiman
Published: (2005)
by: Syed Mohamed, Sulaiman
Published: (2005)
Design Of A Multiwavelength Optical Light Source Using Optical Frequency Comb Generator (OFCG)
by: Thum , Ann
Published: (2005)
by: Thum , Ann
Published: (2005)
A Study On Service Convergence Within A Wireless Metropolitan Area Network (MAN) In Malaysia
by: Tan, Roy Yew Hoong
Published: (2005)
by: Tan, Roy Yew Hoong
Published: (2005)
The Preferences Of Mobile Contents Reguired By Consumers And Factory Influencing The Choice Of Mobile Contents By Different Types Of Consumers
by: Xin, Lim Ke
Published: (2004)
by: Xin, Lim Ke
Published: (2004)
Maxis Communications Berhad: Maintaining Dominance In The Malaysian Mobile Communications Industry
by: Abang Zainal Abidin, Dayang Nuryati
Published: (2004)
by: Abang Zainal Abidin, Dayang Nuryati
Published: (2004)
Design And Performance Analysis Of Mobile Data Networks: WLAN-Cellular Wan Interworking
by: Fredson, Alfred Phiri
Published: (2004)
by: Fredson, Alfred Phiri
Published: (2004)
Efficient Call Admission Control Algorithm For CDMA Communication Systems
by: Chan , Mun Leong
Published: (2005)
by: Chan , Mun Leong
Published: (2005)
The Study Of The Adoption Level Of Wireless Local Area Network (WLAN) By Companies In Cyberjaya Malaysia
by: Vooi, Chang Voon
Published: (2004)
by: Vooi, Chang Voon
Published: (2004)
A Case Study Of Haier Group
by: Shu Hong, Wu
Published: (2005)
by: Shu Hong, Wu
Published: (2005)
Pensonic Holding Berhad Strategies To Achieve Competitiveness
by: Lim, Peng Boon
Published: (2005)
by: Lim, Peng Boon
Published: (2005)
Samsung Electronics Corporation Leadership In Diversified Technological Business
by: Chew, Suan Choo
Published: (2005)
by: Chew, Suan Choo
Published: (2005)
Evaluating Usability Theory Of WWW In Malaysia
by: Wan Mohd Isa, Wan Abdul Rahim
Published: (2005)
by: Wan Mohd Isa, Wan Abdul Rahim
Published: (2005)
A Case Study Of Digi.Com Bhd's Value-Delivery Network
by: Khabele, Tiisetso Slyvia
Published: (2004)
by: Khabele, Tiisetso Slyvia
Published: (2004)
MPEG-4 Video Transmission Over Wireless Bluetooth Links
by: Chong , Hooi Chia
Published: (2003)
by: Chong , Hooi Chia
Published: (2003)
IP To ATM Conversion Scheme
by: Yap , Lee Fueng
Published: (2004)
by: Yap , Lee Fueng
Published: (2004)
POWer adaptive random early detection for DiffServ assured forwarding service classes
by: Ng,, B. K, et al.
Published: (2006)
by: Ng,, B. K, et al.
Published: (2006)
A study on edutainment framework for M-learning
by: Suki, , Norbayah Mohd, et al.
Published: (2006)
by: Suki, , Norbayah Mohd, et al.
Published: (2006)
A technique to improve optical time division multiplexing - wavelength division multiplexing performance
by: Hiew, C. C., et al.
Published: (2005)
by: Hiew, C. C., et al.
Published: (2005)
Effect of Relative Intensity Noise in Optical Transmission Systems Employing Wavelength Conversion Based on XPM and MZI
by: Hiew, C. C., et al.
Published: (2005)
by: Hiew, C. C., et al.
Published: (2005)
Chromatic dispersion penalties in orthogonal subcarrier - Optical tandem single sideband systems (OTSSB)
by: Abdul-Rashid, , HA, et al.
Published: (2005)
by: Abdul-Rashid, , HA, et al.
Published: (2005)
Sorted locally confined non-negative matrix factorization in face verification
by: Teoh, , ABJ, et al.
Published: (2005)
by: Teoh, , ABJ, et al.
Published: (2005)
Integration of wavelet packet decomposition and random secret in iris verification
by: Chin, , CS, et al.
Published: (2005)
by: Chin, , CS, et al.
Published: (2005)
Similar Items
-
Propose a new firefly-fast learning network model based intrusion-detection system
by: Badran, Mohammed Falih, et al.
Published: (2019) -
Propose a new Firefly-Fast Learning Network model based Intrusion-Detection System
by: Mohammed Falih, Badran, et al.
Published: (2019) -
Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
by: A. M., Aleesa, et al.
Published: (2020) -
A hybrid approach to intrusion detection and prevention for business intelligence applications
by: Yee, , Chan Gaik, et al.
Published: (2006) -
Performance evaluation for different intrusion detection system algorithms using machine learning
by: Zarir, Mustafa Nadhim
Published: (2018)