How AIS Addresses Adaptability in IDS
Immune system is essential to human body as it protects our bodies from pathogens in an orchestrated manner. The attractive feature of this system is its ability to detect and fight against various kinds of pathogens. The adaptive process to match the shape of epitopes and gene library evolution man...
| Main Authors: | Zainal, Anazida, Maarof, Mohd. Aizaini, Shamsuddin, Siti Mariyam |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/3223/ http://eprints.utm.my/3223/1/AIS_adaptive_BIC05.pdf |
Similar Items
Finding granular features using rough-PSO in IDS
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Ensemble based categorization and adaptive model for malware detection
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
The optimization of stepping stone detection : packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
The optimization of stepping stone detection: Packet capturing steps
by: Omar, Mohd Nizam, et al.
Published: (2006)
by: Omar, Mohd Nizam, et al.
Published: (2006)
Solving time gap problems through the optimization of detecting stepping stone algorithm
by: Omar, Mohd. Nizam, et al.
Published: (2004)
by: Omar, Mohd. Nizam, et al.
Published: (2004)
The optimization of stepping stone detection: packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Web caching and prefetching: what, why, and how?
by: Sulaiman, Sarina, et al.
Published: (2008)
by: Sulaiman, Sarina, et al.
Published: (2008)
Development knowledge management for adaptive hypermedia learning system
by: Abd. Halim, Shahliza, et al.
Published: (2005)
by: Abd. Halim, Shahliza, et al.
Published: (2005)
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Diffusion analysis af a scalable fiestel network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Symmetric Key Size for Different Level of Information Classification
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000)
by: Kadir, Rashidah, et al.
Published: (2000)
Cryptanalysis using biological inspired computing approaches
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Adaptive neural network classifier for extracted invariants of handwriten digits
by: Keng, L. H., et al.
Published: (2004)
by: Keng, L. H., et al.
Published: (2004)
Attribute related methods for improvement of ID3 Algorithm in classification of data: A review
by: Nur Farahaina, Idris, et al.
Published: (2020)
by: Nur Farahaina, Idris, et al.
Published: (2020)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Distributed Hierarchical IDS For MANET Over AODV+.
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
A survey on the cryptanalysis of the advanced encryption standard
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
Address book builder for network monitoring
by: Paraman, Norlina
Published: (2005)
by: Paraman, Norlina
Published: (2005)
A Cluster-Based Distributed Hierarchical IDS for MANETs
by: B., Pahlevanzadesh, et al.
Published: (2008)
by: B., Pahlevanzadesh, et al.
Published: (2008)
Avalanche Analysis of Extended Feistel Network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Topologi kejiranan gabungan rangkaian kohonen dan particle swarm optimization (pso)
by: Forkan, Fadni, et al.
Published: (2006)
by: Forkan, Fadni, et al.
Published: (2006)
Forecasting time series data using hybrid grey relational artificial neural network and auto regressive integrated moving average model
by: Salleh, Roselina, et al.
Published: (2007)
by: Salleh, Roselina, et al.
Published: (2007)
Visual computer: guest editorial
by: Shamsuddin, Siti Mariyam, et al.
Published: (2007)
by: Shamsuddin, Siti Mariyam, et al.
Published: (2007)
OctaSOM - An octagonal based SOM lattice structure for biomedical problems
by: Hasan, Shafaatunnur, et al.
Published: (2015)
by: Hasan, Shafaatunnur, et al.
Published: (2015)
Breast cancer disease classification using fuzzy-ID3 algorithm with FUZZYDBD method: automatic fuzzy database definition
by: Nur Farahaina, Idris, et al.
Published: (2021)
by: Nur Farahaina, Idris, et al.
Published: (2021)
Addressing the Brittleness of Agent Interaction
by: Hassan, M.F., et al.
Published: (2008)
by: Hassan, M.F., et al.
Published: (2008)
Security awareness: A lesson from Tcpdump and Ethereal
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004)
by: Idris, Mohd. Yazid, et al.
Published: (2004)
Fast optimization method : the window size and hurst parameter estimator on self-similar network traffic
by: Idris, Mohd. Yazid, et al.
Published: (2007)
by: Idris, Mohd. Yazid, et al.
Published: (2007)
Cabaran AI dalam Pendidikan: Kaedah Mengesan Penggunaan Alatan AI dalam Tugasan Pelajar
by: Rahmah, Mokhtar
Published: (2024)
by: Rahmah, Mokhtar
Published: (2024)
Similar Items
-
Finding granular features using rough-PSO in IDS
by: Zainal, Anazida, et al.
Published: (2007) -
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006) -
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006) -
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008) -
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)