Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Witcha chimphlee"'
Autor:
Siriporn Chimphlee, Witcha Chimphlee
With the rapid growth of digital technology communications are overwhelmed by network data traffic. The demand for the internet is growing every day in today's cyber world, raising concerns about network security. Big Data are a term that describes a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cc1866156fc42bebe59f373ed6b747e3
https://zenodo.org/record/7972350
https://zenodo.org/record/7972350
Publikováno v:
INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences. 5:187-194
Publikováno v:
2012 Tenth International Conference on ICT and Knowledge Engineering.
We propose a two-phase classification method. Specifically, in the first phase, a set of patterns (data) are clustered by the k-means algorithm. In the second phase, outliers are constructed by a distance-based technique and a class label is assigned
Autor:
Witcha Chimphlee, Dahliyusmanto Dahlan, K. bin Abu Bak, Abdul Hanan Abdullah, M.A. bin Ngadi, A.S. bin Haji Ismail
Publikováno v:
ICCSA Workshops
Most current intrusion detection methods cannot process large amounts of audit data for real-time operation. In this paper, anomaly network intrusion detection method based on principal component analysis (PCA) for data reduction and fuzzy adaptive r
Publikováno v:
Advances in Systems, Computing Sciences and Software Engineering ISBN: 9781402052620
Predicting the next request of a user as visits Web pages has gained importance as Web-based activity increases. A large amount of research has been done on trying to predict correctly the pages a user will request. This task requires the development
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7dfff2a30644c0ef5b56c0ccdb4dae58
https://doi.org/10.1007/1-4020-5263-4_58
https://doi.org/10.1007/1-4020-5263-4_58
One main drawback of intrusion detection system is the inability of detecting new attacks which do not have known signatures. In this paper we discuss an intrusion detection method that proposes independent component analysis (ICA) based feature sele
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0e361cfccf37dea45f8dd51192dfad14
It is important problems to increase the detection rates and reduce false positive rates in Intrusion Detection System (IDS). Although preventative techniques such as access control and authentication attempt to prevent intruders, these can fail, and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::442c56b90a57befe786d0537f99bd06f
Publikováno v:
2005 Annual IEEE India Conference - Indicon.
The goal of intrusion detection is to discover unauthorized use of computer systems. New intrusion types, of which detection systems are unaware, are the most difficult to detect. The amount of available network audit data instances is usually large;
Publikováno v:
Scopus-Elsevier
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::3fec2994752db6c4a2f91992e4ebb3f1
http://www.scopus.com/inward/record.url?eid=2-s2.0-38049169598&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-38049169598&partnerID=MN8TOARS
Publikováno v:
Scopus-Elsevier
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::64efcc912811721eb422369f146c16dc
http://www.scopus.com/inward/record.url?eid=2-s2.0-33645139674&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-33645139674&partnerID=MN8TOARS