Zobrazeno 1 - 10
of 451
pro vyhledávání: '"Alroobaea Roobaea"'
Publikováno v:
Journal of Intelligent Systems, Vol 31, Iss 1, Pp 454-465 (2022)
For a better detection in Network information security monitoring system, the author proposes a method based on adaptive depth detection. A deep belief network (DBN) was designed and implemented, and the intrusion detection system model was combined
Externí odkaz:
https://doaj.org/article/6a2f37828b594c52901961d953d765c2
Publikováno v:
Journal of Intelligent Systems, Vol 31, Iss 1, Pp 520-531 (2022)
Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of t
Externí odkaz:
https://doaj.org/article/e5b3fec3ee444090ab696c263152df1b
Publikováno v:
Journal of Intelligent Systems, Vol 30, Iss 1, Pp 750-762 (2021)
The data with the advancement of information technology are increasing on daily basis. The data mining technique has been applied to various fields. The complexity and execution time are the major factors viewed in existing data mining techniques. Wi
Externí odkaz:
https://doaj.org/article/f1baa2b003d14ef78577a93207b8a422
Publikováno v:
Journal of Intelligent Systems, Vol 30, Iss 1, Pp 664-676 (2021)
In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect. This work proposes an improved k-means algorithm and an improved Apriori algorithm applied in data
Externí odkaz:
https://doaj.org/article/2c2e7184b68d40cf82bd25d616c8b3c7
Autor:
Wang Liwei, Abbas Robert, Almansour Fahad M., Gaba Gurjot Singh, Alroobaea Roobaea, Masud Mehedi
Publikováno v:
Journal of Intelligent Systems, Vol 30, Iss 1, Pp 592-603 (2021)
With the advancement of internet and the emergence of network globalization, security has always been a major concern. During the trial operation, the management control platform discussed in this article included more than 600 network security vulne
Externí odkaz:
https://doaj.org/article/799e3428504b4e6da93b47baf739df6d
Publikováno v:
Cybernetics and Information Technologies, Vol 17, Iss 4, Pp 32-51 (2017)
Cybersecurity attacks resulting in loss of availability of cloud services can have significantly higher impact than those in the traditional stand-alone enterprise setups. Therefore, availability attacks, such as Denial of Service attacks (DoS); Dist
Externí odkaz:
https://doaj.org/article/fe99b370a0de469eb8a5cf4288b63742
Autor:
Sohail, Muhammad Tahir, Yin, Jinde, Abdullah, Muhammad, Younis, Muhammad, Anjum, Muhammad Naveed, Sohail, Muhammad Tayyab, Alroobaea, Roobaea, Ahmad, Imtiaz, Peiguang, Yan
Publikováno v:
In Materials Today Physics December 2024 49
Autor:
Wulfran, Fendzi Mbasso, Reagan Jean Jacques, Molu, Serge Raoul, Dzonde Naoussi, Harrison, Ambe, Saatong, Kenfack Tsobze, Alruwaili, Mohammed, Alroobaea, Roobaea, Algarni, Sultan, Yousef, Amr
Publikováno v:
In Alexandria Engineering Journal November 2024 106:252-276
Publikováno v:
In Biomedical Signal Processing and Control October 2024 96 Part B
Autor:
Khan, Abdullah Ayub, Yang, Jing, Laghari, Asif Ali, Baqasah, Abdullah M., Alroobaea, Roobaea, Ku, Chin Soon, Alizadehsani, Roohallah, Acharya, U. Rajendra, Por, Lip Yee
Publikováno v:
In Engineering Applications of Artificial Intelligence 1 February 2025 141