A new approach based on honeybee guarding system to improve intrusion detection system.
Serangan yang semakin meningkat terhadap rangkaian dalam pelbagai cara yang canggih mendapat perhatian daripada pihak keselamatan rangkaian. Sistem pengesanan penerobohan (intrusion detection system, IDS) digunakan untuk mengenal pasti atau membezakan antara pengguna yang sah (legitimate incomer) de...
| Main Author: | Ahmed Ali, Ghassan |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/40918/ |
| Abstract | Abstract here |
Similar Items
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
An Approach For Detection Of Logical Inconsistency
by: Yadav, Rinki
Published: (2012)
by: Yadav, Rinki
Published: (2012)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
Enhanced and automated approaches for fish recognition and classification system
by: Samma, Ali Salem Ali
Published: (2011)
by: Samma, Ali Salem Ali
Published: (2011)
Acltshe-Amts: A New Adaptive Brain Tumour Enhancement And Segmentation Approaches
by: Alkhafaji, Ali Fawzi Mohammed Ali
Published: (2024)
by: Alkhafaji, Ali Fawzi Mohammed Ali
Published: (2024)
An Efficient Safety System For Vanet Using Enhanced Message Dissemination Protocols With Channel Performance Control
by: Samara, Ghassan Abedalkarim Abdullah
Published: (2012)
by: Samara, Ghassan Abedalkarim Abdullah
Published: (2012)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008)
by: A. Alia, Mohammad Ahmad
Published: (2008)
New Fuzzy Parametric Linear Programming Approaches For Optimising The Performance Of Crude Oil Companies In Iraq
by: Jasim, Al Saeedi Rafid Abdulmahdi
Published: (2023)
by: Jasim, Al Saeedi Rafid Abdulmahdi
Published: (2023)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016)
by: Jahani, Shahram
Published: (2016)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Heuristic Based Planning Approach For
Improving Wireless Network Coverage Of Multi-Storey Building
by: Yeong, Shoa Yei
Published: (2011)
by: Yeong, Shoa Yei
Published: (2011)
An Enhanced Artificial Immune System
Approach For Assembly Line Balancing
Problem Through Shifting Bottleneck
Identification
by: Khalid, Mohd Nor Akmal
Published: (2018)
by: Khalid, Mohd Nor Akmal
Published: (2018)
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
An Improved K-Nearest Neighbors Approach Using Modified Term Weighting And Similarity Coefficient For Text Classification
by: Kadhim, Ammar Ismael
Published: (2016)
by: Kadhim, Ammar Ismael
Published: (2016)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
Extension Of Information Systems Success Model For The Gamification E-Learning System
by: Al-Muwassefi, Hala Najwan Sabeh
Published: (2022)
by: Al-Muwassefi, Hala Najwan Sabeh
Published: (2022)
An Innovative System To Monitor E-Mail Systems
Environments Using Active Monitoring
by: Hussein Albazar, Hussein Abdelrahman
Published: (2010)
by: Hussein Albazar, Hussein Abdelrahman
Published: (2010)
ETC training management system / the needs and expectations for training management system in Thailand
by: Adam, Metinee
Published: (2009)
by: Adam, Metinee
Published: (2009)
Zot-mk: A New Algorithm For Big Integer Multiplication
by: Jahani , Shahram
Published: (2009)
by: Jahani , Shahram
Published: (2009)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)
by: Eghdamian, Arash
Published: (2020)
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
Automated Fish Detection And Identification
by: Wong , Poh Lee
Published: (2015)
by: Wong , Poh Lee
Published: (2015)
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
by: Mohammad A. Suwais, Khaled
Published: (2009)
by: Mohammad A. Suwais, Khaled
Published: (2009)
ZOT-MK: a new algorithm for big integer multiplication[QA75].
by: Jahani, Shahram
Published: (2009)
by: Jahani, Shahram
Published: (2009)
Enhancement Of Wifi Indoor Positioning
System
by: Aboodi, Ahed Hussein
Published: (2011)
by: Aboodi, Ahed Hussein
Published: (2011)
An Efficiency Analysis Of Seaports Using Extended
Window Analysis, Malmquist Index And Simar-wilson
Approach
by: Naser Al-Eraqi , Ahmed Salem
Published: (2009)
by: Naser Al-Eraqi , Ahmed Salem
Published: (2009)
Management Report System For Electricity Companies:
A Proposed Model For Management Report System
(Mrs) In Zanjan Regional Electric Company.
by: Farrokhi, Vahid
Published: (2010)
by: Farrokhi, Vahid
Published: (2010)
Cancer Diet System: User Requirement Analysis
by: Saludin, Farhana Aini
Published: (2010)
by: Saludin, Farhana Aini
Published: (2010)
Ethical Framework On Breast Self-Examination System
by: Khana, Rajes
Published: (2022)
by: Khana, Rajes
Published: (2022)
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
A Study On Determinants Of Rfid Adoption Intention Among Hajj Organizers In Indonesia And Malaysia And Its Strategic Information Systems Plan
by: Al-Hashedi, Abdullah Hussein Ahmed
Published: (2013)
by: Al-Hashedi, Abdullah Hussein Ahmed
Published: (2013)
A Visual Approach For Requirement Traceability
by: Madaki, Abdulkadir Ahmad
Published: (2022)
by: Madaki, Abdulkadir Ahmad
Published: (2022)
Video On Demand System For Heterogeneous
Wireless Mobile Networks
by: Al-Omari, Saleh Ali Khattap
Published: (2013)
by: Al-Omari, Saleh Ali Khattap
Published: (2013)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
Similar Items
-
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011) -
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010) -
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023) -
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019) -
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
