Intrusion detection system using hybrid GSA-k-Means
Security is an important aspect in our daily life. Intrusion Detection Systems (IDS) are developed to be the defense against security threats. Current signature based IDS like firewalls and antiviruses, which rely on labeled training data, generally cannot detect novel attacks. The purpose of this s...
| Auteur principal: | Aslahi, Bibi Masoomeh |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2013
|
| Sujets: | |
| Accès en ligne: | http://eprints.utm.my/78118/1/BibiMasoomehAslahiMFC20131.pdf |
Documents similaires
Intrusion detection system using hybird gsa-k-means
par: Aslahi Shahri, Bibi Masoomeh
Publié: (2013)
par: Aslahi Shahri, Bibi Masoomeh
Publié: (2013)
Hybrid fuzzy techniques for unsupervised intrusion detection system
par: Chimphlee, Witcha
Publié: (2008)
par: Chimphlee, Witcha
Publié: (2008)
A mean convolution layer for network intrusion detection systems / Leila Mohammadpour
par: Leila , Mohammadpour
Publié: (2024)
par: Leila , Mohammadpour
Publié: (2024)
Hybrid optimization for k-means clustering learning enhancement
par: Farhang, Yousef
Publié: (2016)
par: Farhang, Yousef
Publié: (2016)
Hybrid intelligent approach for network intrusion detection
par: Al-Mohammed, Wael Hasan Ali
Publié: (2015)
par: Al-Mohammed, Wael Hasan Ali
Publié: (2015)
Comparative study between fuzzy C-Means algorithm and artificial immune network algorithm in intrusion detection system
par: Abunada, Ahmed A. A.
Publié: (2013)
par: Abunada, Ahmed A. A.
Publié: (2013)
Hybrid artificial neural network and gravitational search algorithm in intrusion detection system
par: Rahati, Shahdokht
Publié: (2013)
par: Rahati, Shahdokht
Publié: (2013)
Intrusive system calls analysis for intrusion detection system
par: Ramakrishna, Pathmenanthan
Publié: (2004)
par: Ramakrishna, Pathmenanthan
Publié: (2004)
An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title
par: Khalaf, Emad Taha
Publié: (2019)
par: Khalaf, Emad Taha
Publié: (2019)
Ensemble methods in intrusion detection
par: Josiah, Kekere Temitope
Publié: (2015)
par: Josiah, Kekere Temitope
Publié: (2015)
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
par: Dahlan, Dahliyusmanto
Publié: (2004)
par: Dahlan, Dahliyusmanto
Publié: (2004)
Gravitational search algorithm for feature selection in intrusion detection system
par: Jabali, Vahid Kaviani
Publié: (2013)
par: Jabali, Vahid Kaviani
Publié: (2013)
Anomaly intrusion detection system using immune network with reduced network traffic features
par: Qasem, Murad Abdo Rassam
Publié: (2010)
par: Qasem, Murad Abdo Rassam
Publié: (2010)
Analyzing pattern matching algorithms applied on snort intrusion detection system
par: Abdullahi, Abdifatah Abdirahman
Publié: (2013)
par: Abdullahi, Abdifatah Abdirahman
Publié: (2013)
Analysis and design of intrusion detection system implementation / Chia Fook Keong
par: Chia, Fook Keong
Publié: (2003)
par: Chia, Fook Keong
Publié: (2003)
Privacy preserving data mining using anonymization and K-means clustering on labor dataset
par: Ahmad Zahari, Samahah Solehah
Publié: (2019)
par: Ahmad Zahari, Samahah Solehah
Publié: (2019)
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
par: Mohammad Khamees Khaleel, Alsajri
Publié: (2022)
par: Mohammad Khamees Khaleel, Alsajri
Publié: (2022)
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
par: Shamshirband, Shahaboddin
Publié: (2014)
par: Shamshirband, Shahaboddin
Publié: (2014)
An adaptive and distributed intrusion detection scheme for cloud computing
par: Ibrahim, Nurudeen Mahmud
Publié: (2019)
par: Ibrahim, Nurudeen Mahmud
Publié: (2019)
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
par: Al-Zarqawee, Aws Naser
Publié: (2018)
par: Al-Zarqawee, Aws Naser
Publié: (2018)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
par: Hnaif, Adnan Ahmad Abdelfattah
Publié: (2010)
par: Hnaif, Adnan Ahmad Abdelfattah
Publié: (2010)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
par: Wasswa, Hassan
Publié: (2019)
par: Wasswa, Hassan
Publié: (2019)
An adaptive intrusion detection model for dynamic network traffic patterns using machine learning techniques
par: Zainal, Anazida
Publié: (2011)
par: Zainal, Anazida
Publié: (2011)
An efficient on-line hurst parameter estimator for detecting volume-based network intrusion attacks
par: Idris, Mohd. Yazid
Publié: (2008)
par: Idris, Mohd. Yazid
Publié: (2008)
Image splicing detection scheme using adaptive threshold mean ternary pattern descriptor
par: Abrahim, Araz Rajab
Publié: (2019)
par: Abrahim, Araz Rajab
Publié: (2019)
Intrusion detection system : a step ahead in protecting e-commerce security infrastucture
par: Zakaria, Nur Haryani
Publié: (2002)
par: Zakaria, Nur Haryani
Publié: (2002)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
par: Ahmed Ali, Ghassan
Publié: (2011)
par: Ahmed Ali, Ghassan
Publié: (2011)
A new approach based on honeybee guarding system to improve intrusion detection system.
par: Ahmed Ali, Ghassan
Publié: (2011)
par: Ahmed Ali, Ghassan
Publié: (2011)
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
par: Al Ghuraibawi, Adnan Hasan Bdair
Publié: (2023)
par: Al Ghuraibawi, Adnan Hasan Bdair
Publié: (2023)
A novel secure mud-based real time intrusion detection and prevention mechanism for IoT network / Noman Mazhar
par: Noman , Mazhar
Publié: (2023)
par: Noman , Mazhar
Publié: (2023)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
par: Ghanem, Waheed Ali Hussein Mohammed
Publié: (2019)
par: Ghanem, Waheed Ali Hussein Mohammed
Publié: (2019)
An architectural design for a hybrid intrusion detection system for database
par: Haratian, Mohammad Hossein
Publié: (2009)
par: Haratian, Mohammad Hossein
Publié: (2009)
Hybrid detection for databases using SQL injection and insider misuse detection techniques
par: Asmawi, Aziah
Publié: (2010)
par: Asmawi, Aziah
Publié: (2010)
Cloud based privacy preserving data mining model using hybrid k-anonymity and partial homomorphic encryption
par: Mansour Osman, Huda Osman
Publié: (2022)
par: Mansour Osman, Huda Osman
Publié: (2022)
A lightweight intrusion detection framework using focal loss variational autoencoder for internet of things / Shapla Khanam
par: Shapla , Khanam
Publié: (2022)
par: Shapla , Khanam
Publié: (2022)
A lightweight host-based intrusion detection system using N-gram and perceptron model for internet of things / Belal Sudqi Abed Saleh Khater
par: Belal Sudqi Abed , Saleh Khater
Publié: (2021)
par: Belal Sudqi Abed , Saleh Khater
Publié: (2021)
Hybrid Neural Network With K-Means For Forecasting Response Candidate In Direct Marketing
par: Ramadhan, Rakhmat Sani
Publié: (2014)
par: Ramadhan, Rakhmat Sani
Publié: (2014)
Hybrid simple artificial immune system and gravitational search algorithm for spam detection
par: Mousa, Hisham N. A.
Publié: (2013)
par: Mousa, Hisham N. A.
Publié: (2013)
Hybrid approach for spam email detection
par: Syed Hamed, Syed Mohd. Anwar Alhabshi
Publié: (2018)
par: Syed Hamed, Syed Mohd. Anwar Alhabshi
Publié: (2018)
Spam detection using hybrid of artificial neural network and genetic algorithm
par: Arram, Anas W. A.
Publié: (2013)
par: Arram, Anas W. A.
Publié: (2013)
Documents similaires
-
Intrusion detection system using hybird gsa-k-means
par: Aslahi Shahri, Bibi Masoomeh
Publié: (2013) -
Hybrid fuzzy techniques for unsupervised intrusion detection system
par: Chimphlee, Witcha
Publié: (2008) -
A mean convolution layer for network intrusion detection systems / Leila Mohammadpour
par: Leila , Mohammadpour
Publié: (2024) -
Hybrid optimization for k-means clustering learning enhancement
par: Farhang, Yousef
Publié: (2016) -
Hybrid intelligent approach for network intrusion detection
par: Al-Mohammed, Wael Hasan Ali
Publié: (2015)