A New Approach Based On Honeybee Guarding System To Improve Intrusion Detection System
Serangan yang semakin meningkat terhadap rangkaian dalam pelbagai cara yang canggih mendapat perhatian daripada pihak keselamatan rangkaian. Increasing of network attacks with sophisticated forms has made the network security concern a significant necessity for such a network.
| Auteur principal: | Ahmed Ali, Ghassan |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2011
|
| Sujets: | |
| Accès en ligne: | http://eprints.usm.my/29529/ |
| Abstract | Abstract here |
Documents similaires
A new approach based on honeybee guarding system to improve intrusion detection system.
par: Ahmed Ali, Ghassan
Publié: (2011)
par: Ahmed Ali, Ghassan
Publié: (2011)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
par: Hnaif, Adnan Ahmad Abdelfattah
Publié: (2010)
par: Hnaif, Adnan Ahmad Abdelfattah
Publié: (2010)
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
par: Al Ghuraibawi, Adnan Hasan Bdair
Publié: (2023)
par: Al Ghuraibawi, Adnan Hasan Bdair
Publié: (2023)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
par: Ghanem, Waheed Ali Hussein Mohammed
Publié: (2019)
par: Ghanem, Waheed Ali Hussein Mohammed
Publié: (2019)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
par: Alieyan, Kamal Ibrahim Ahmed
Publié: (2018)
par: Alieyan, Kamal Ibrahim Ahmed
Publié: (2018)
An Approach For Detection Of Logical Inconsistency
par: Yadav, Rinki
Publié: (2012)
par: Yadav, Rinki
Publié: (2012)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
par: Al-Saedi, Karim Hashim Kraidi
Publié: (2013)
par: Al-Saedi, Karim Hashim Kraidi
Publié: (2013)
Acltshe-Amts: A New Adaptive Brain Tumour Enhancement And Segmentation Approaches
par: Alkhafaji, Ali Fawzi Mohammed Ali
Publié: (2024)
par: Alkhafaji, Ali Fawzi Mohammed Ali
Publié: (2024)
An Efficient Safety System For Vanet Using Enhanced Message Dissemination Protocols With Channel Performance Control
par: Samara, Ghassan Abedalkarim Abdullah
Publié: (2012)
par: Samara, Ghassan Abedalkarim Abdullah
Publié: (2012)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
par: A. Alia, Mohammad Ahmad
Publié: (2008)
par: A. Alia, Mohammad Ahmad
Publié: (2008)
Enhanced and automated approaches for fish recognition and classification system
par: Samma, Ali Salem Ali
Publié: (2011)
par: Samma, Ali Salem Ali
Publié: (2011)
New Fuzzy Parametric Linear Programming Approaches For Optimising The Performance Of Crude Oil Companies In Iraq
par: Jasim, Al Saeedi Rafid Abdulmahdi
Publié: (2023)
par: Jasim, Al Saeedi Rafid Abdulmahdi
Publié: (2023)
Approach for solving active perturbation attack problem in stepping stone detection.
par: Omar, Mohd Nizam
Publié: (2011)
par: Omar, Mohd Nizam
Publié: (2011)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
par: Elejla, Omar E. O.
Publié: (2018)
par: Elejla, Omar E. O.
Publié: (2018)
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
par: Jahani, Shahram
Publié: (2016)
par: Jahani, Shahram
Publié: (2016)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
par: Anbar, Mohammed F.R.
Publié: (2013)
par: Anbar, Mohammed F.R.
Publié: (2013)
A Hybrid Multi-Tier Approach For Iot Botnet Detection And Enhanced Risk Assessment
par: Ali, Mashaleh Ashraf Sulieman
Publié: (2025)
par: Ali, Mashaleh Ashraf Sulieman
Publié: (2025)
Heuristic Based Planning Approach For
Improving Wireless Network Coverage Of Multi-Storey Building
par: Yeong, Shoa Yei
Publié: (2011)
par: Yeong, Shoa Yei
Publié: (2011)
An Enhanced Artificial Immune System
Approach For Assembly Line Balancing
Problem Through Shifting Bottleneck
Identification
par: Khalid, Mohd Nor Akmal
Publié: (2018)
par: Khalid, Mohd Nor Akmal
Publié: (2018)
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
par: Ali Mohamed, Nachaat Abdelatif
Publié: (2022)
par: Ali Mohamed, Nachaat Abdelatif
Publié: (2022)
An Improved K-Nearest Neighbors Approach Using Modified Term Weighting And Similarity Coefficient For Text Classification
par: Kadhim, Ammar Ismael
Publié: (2016)
par: Kadhim, Ammar Ismael
Publié: (2016)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
par: Keshkeh, Kinan
Publié: (2022)
par: Keshkeh, Kinan
Publié: (2022)
Zot-mk: A New Algorithm For Big Integer Multiplication
par: Jahani , Shahram
Publié: (2009)
par: Jahani , Shahram
Publié: (2009)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
par: Eghdamian, Arash
Publié: (2020)
par: Eghdamian, Arash
Publié: (2020)
Extension Of Information Systems Success Model For The Gamification E-Learning System
par: Al-Muwassefi, Hala Najwan Sabeh
Publié: (2022)
par: Al-Muwassefi, Hala Najwan Sabeh
Publié: (2022)
An Innovative System To Monitor E-Mail Systems
Environments Using Active Monitoring
par: Hussein Albazar, Hussein Abdelrahman
Publié: (2010)
par: Hussein Albazar, Hussein Abdelrahman
Publié: (2010)
ETC training management system / the needs and expectations for training management system in Thailand
par: Adam, Metinee
Publié: (2009)
par: Adam, Metinee
Publié: (2009)
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
par: Mohammad A. Suwais, Khaled
Publié: (2009)
par: Mohammad A. Suwais, Khaled
Publié: (2009)
ZOT-MK: a new algorithm for big integer multiplication[QA75].
par: Jahani, Shahram
Publié: (2009)
par: Jahani, Shahram
Publié: (2009)
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
par: Mohammed Ahmed Saad, Redhwan
Publié: (2016)
par: Mohammed Ahmed Saad, Redhwan
Publié: (2016)
An Efficiency Analysis Of Seaports Using Extended
Window Analysis, Malmquist Index And Simar-wilson
Approach
par: Naser Al-Eraqi , Ahmed Salem
Publié: (2009)
par: Naser Al-Eraqi , Ahmed Salem
Publié: (2009)
Automated Fish Detection And Identification
par: Wong , Poh Lee
Publié: (2015)
par: Wong , Poh Lee
Publié: (2015)
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
par: Jaafar, Abdullah Mohammed Abdo Ali
Publié: (2011)
par: Jaafar, Abdullah Mohammed Abdo Ali
Publié: (2011)
A Visual Approach For Requirement Traceability
par: Madaki, Abdulkadir Ahmad
Publié: (2022)
par: Madaki, Abdulkadir Ahmad
Publié: (2022)
Enhancement Of Wifi Indoor Positioning
System
par: Aboodi, Ahed Hussein
Publié: (2011)
par: Aboodi, Ahed Hussein
Publié: (2011)
Keyword Competition Approach In
Ranked Document Retrieval
par: Sihombing, Poltak
Publié: (2010)
par: Sihombing, Poltak
Publié: (2010)
Cancer Diet System: User Requirement Analysis
par: Saludin, Farhana Aini
Publié: (2010)
par: Saludin, Farhana Aini
Publié: (2010)
Ethical Framework On Breast Self-Examination System
par: Khana, Rajes
Publié: (2022)
par: Khana, Rajes
Publié: (2022)
A Study On Determinants Of Rfid Adoption Intention Among Hajj Organizers In Indonesia And Malaysia And Its Strategic Information Systems Plan
par: Al-Hashedi, Abdullah Hussein Ahmed
Publié: (2013)
par: Al-Hashedi, Abdullah Hussein Ahmed
Publié: (2013)
Management Report System For Electricity Companies:
A Proposed Model For Management Report System
(Mrs) In Zanjan Regional Electric Company.
par: Farrokhi, Vahid
Publié: (2010)
par: Farrokhi, Vahid
Publié: (2010)
Documents similaires
-
A new approach based on honeybee guarding system to improve intrusion detection system.
par: Ahmed Ali, Ghassan
Publié: (2011) -
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
par: Hnaif, Adnan Ahmad Abdelfattah
Publié: (2010) -
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
par: Al Ghuraibawi, Adnan Hasan Bdair
Publié: (2023) -
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
par: Ghanem, Waheed Ali Hussein Mohammed
Publié: (2019) -
Rule-Based Approach For Detecting Botnet Based On Domain Name System
par: Alieyan, Kamal Ibrahim Ahmed
Publié: (2018)
