Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb
The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which leads to cyber-attack, financial loss, information theft and cyber war. Hence, network security analytics has become an important area of concern and has gained intensive attention amo...
| Auteur principal: | Riyaz Ahamed , Ariyaluran Habeeb |
|---|---|
| Format: | Thèse |
| Publié: |
2019
|
| Sujets: |
Documents similaires
An evaluation of machine translation quality of news headlines / Luwaytha Salah Habeeb
par: Luwaytha, Salah Habeeb
Publié: (2013)
par: Luwaytha, Salah Habeeb
Publié: (2013)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
par: Abbas, Borkan Ahmed
Publié: (2016)
par: Abbas, Borkan Ahmed
Publié: (2016)
Application of CAD and CAE on plastic injection mold design for automotive part / Azizan Ahamed
par: Ahamed, Azizan
Publié: (2010)
par: Ahamed, Azizan
Publié: (2010)
Ferroresonance in capacitive voltage transformer (CVT) due to breaker opening / Shakil Ahamed Khan
par: Khan, Shakil Ahamed
Publié: (2015)
par: Khan, Shakil Ahamed
Publié: (2015)
Convective heat transfer in square and cylindrical porous annulus / Salman Ahamed Khan Jagirdar
par: Salman Ahamed Khan , Jagirdar
Publié: (2013)
par: Salman Ahamed Khan , Jagirdar
Publié: (2013)
The effect of mental imagery training in developing accuracy and speed of basic badminton skills among beginner players / Habeeb Y. Kasim
par: Y. Kasim, Habeeb
Publié: (2013)
par: Y. Kasim, Habeeb
Publié: (2013)
Real Time Support Systems
par: Wong, Kwok Thye
Publié: (2001)
par: Wong, Kwok Thye
Publié: (2001)
Real-time whiteboard / Ng Yih Young
par: Ng , Yih Young
Publié: (2002)
par: Ng , Yih Young
Publié: (2002)
Geochemical characterisation of the late cretaceous coal and mudstones from gombe formation, gongola sub-basin, Northern Benue trough, Nigeria / Ayinla Habeeb Ayoola
par: Ayinla Habeeb, Ayoola
Publié: (2018)
par: Ayinla Habeeb, Ayoola
Publié: (2018)
Code generation for embedded real time system
par: Talab, Mahmood Aghajani Siroos
Publié: (2010)
par: Talab, Mahmood Aghajani Siroos
Publié: (2010)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
par: Wasswa, Hassan
Publié: (2019)
par: Wasswa, Hassan
Publié: (2019)
Identification of ECG anomalies through deep deterministic learning / Uzair Iqbal
par: Uzair , Iqbal
Publié: (2020)
par: Uzair , Iqbal
Publié: (2020)
Real-time sound equalizer using component based system / Nazrul Mizuar Anuar
par: Anuar, Nazrul Mizuar
Publié: (2007)
par: Anuar, Nazrul Mizuar
Publié: (2007)
Real-time remote control car racing system (PC Version)
par: Shariff, Syarul Nizam
Publié: (2006)
par: Shariff, Syarul Nizam
Publié: (2006)
Multi-round divisible real-time scheduling algorithm on multiprocessor platforms
par: Razmara, Pegah
Publié: (2015)
par: Razmara, Pegah
Publié: (2015)
Real time volumetric rendering optimization approach for cloudscapes in virtual environment
par: Zamri, Muhamad Najib
Publié: (2022)
par: Zamri, Muhamad Najib
Publié: (2022)
An efficient anomaly intrusion detection method with evolutionary neural network
par: Sarvari, Samira
Publié: (2020)
par: Sarvari, Samira
Publié: (2020)
An ensemble-based anomaly-behavioural crypto-ransomware pre-encryption detection model
par: Al-Rimy, Bander Ali Saleh
Publié: (2019)
par: Al-Rimy, Bander Ali Saleh
Publié: (2019)
Mobile application on real-time highway traffic status in Malaysia / Akmal Irham Asnor
par: Asnor, Akmal Irham
Publié: (2019)
par: Asnor, Akmal Irham
Publié: (2019)
A comparison of different technique in flow based anomaly detection
par: Salah, Mohammad
Publié: (2017)
par: Salah, Mohammad
Publié: (2017)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
par: Firas (M.H.) S., Najjar
Publié: (2016)
par: Firas (M.H.) S., Najjar
Publié: (2016)
An improved hybrid learning approach for better anomaly detection
par: Mohamed Yassin, Warusia
Publié: (2011)
par: Mohamed Yassin, Warusia
Publié: (2011)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
par: Mohamed Yassin, Warusia
Publié: (2015)
par: Mohamed Yassin, Warusia
Publié: (2015)
A scheduling analysis framework for predicting the weakly hard real-time systems
par: Ismail, Habibah
Publié: (2013)
par: Ismail, Habibah
Publié: (2013)
Denaturation behavior and conformational states of champedak galactose-binding lectin under various denaturing conditions / Nurul Iman Ahamed Kameel
par: Nurul Iman , Ahamed Kameel
Publié: (2018)
par: Nurul Iman , Ahamed Kameel
Publié: (2018)
Anomaly intrusion detection system using immune network with reduced network traffic features
par: Qasem, Murad Abdo Rassam
Publié: (2010)
par: Qasem, Murad Abdo Rassam
Publié: (2010)
Distributed anomaly detection scheme based on lightweight data aggregation in wireless sensor network
par: Mohd. Zamry, Nurfazrina
Publié: (2022)
par: Mohd. Zamry, Nurfazrina
Publié: (2022)
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
par: Zahedeh, Zamanian
Publié: (2019)
par: Zahedeh, Zamanian
Publié: (2019)
The framing of BBC Arabic online news on Trump's travel bans / Dania Yahya Hamed Ibrahim Ahamed Alshershaby
par: Dania Yahya, Hamed Ibrahim Ahamed Alshershaby
Publié: (2019)
par: Dania Yahya, Hamed Ibrahim Ahamed Alshershaby
Publié: (2019)
Development process with schedulability analysis (DePSA) integrated approach for real time systems
par: Sengoz, Yavuz Selim
Publié: (2011)
par: Sengoz, Yavuz Selim
Publié: (2011)
Real-time shadow casting using fake soft shadow volume with stencil buffer
par: Lee, Kong Weng
Publié: (2006)
par: Lee, Kong Weng
Publié: (2006)
Enhancement of parallel K-means algorithm for clustering big datasets
par: Ashabi, Ardavan
Publié: (2022)
par: Ashabi, Ardavan
Publié: (2022)
Real Time Face-Tracking And Iris Localization
par: Razalli, Husniza
Publié: (2009)
par: Razalli, Husniza
Publié: (2009)
An anti virus scheme using digital signature and anomaly detection techniques
par: Subramaniam, Suresh Babu
Publié: (2003)
par: Subramaniam, Suresh Babu
Publié: (2003)
Optimized subtractive clustering for cluster-based compound selection
par: Kuik, Sok Ping
Publié: (2006)
par: Kuik, Sok Ping
Publié: (2006)
Framework To Enhance Veracity And Quality Of Big Data
par: Ridzuan, Fakhitah
Publié: (2021)
par: Ridzuan, Fakhitah
Publié: (2021)
Enhancing the burst assembly scheme for real-time traffic over optical burst switching networks
par: Al-Shargabi, Mohammed Abdulatef Ali
Publié: (2011)
par: Al-Shargabi, Mohammed Abdulatef Ali
Publié: (2011)
Real time scheduling for autonomous mobile robots using genetic algorithm and constraint based reasoning
par: Mohammed Hasan, Ammar Abdo
Publié: (2006)
par: Mohammed Hasan, Ammar Abdo
Publié: (2006)
Layered system architecture of remote robotic laboratory for real-time distant learning / Faisal Mahmud
par: Faisal , Mahmud
Publié: (2022)
par: Faisal , Mahmud
Publié: (2022)
Real-time FPGA implementation of baseline JPEG codec processor core
par: Suleiman, Ishak
Publié: (2002)
par: Suleiman, Ishak
Publié: (2002)
Documents similaires
-
An evaluation of machine translation quality of news headlines / Luwaytha Salah Habeeb
par: Luwaytha, Salah Habeeb
Publié: (2013) -
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
par: Abbas, Borkan Ahmed
Publié: (2016) -
Application of CAD and CAE on plastic injection mold design for automotive part / Azizan Ahamed
par: Ahamed, Azizan
Publié: (2010) -
Ferroresonance in capacitive voltage transformer (CVT) due to breaker opening / Shakil Ahamed Khan
par: Khan, Shakil Ahamed
Publié: (2015) -
Convective heat transfer in square and cylindrical porous annulus / Salman Ahamed Khan Jagirdar
par: Salman Ahamed Khan , Jagirdar
Publié: (2013)