Author

AN Author - Proc. 12 th Int. Zeolite Conf, 1998 - HeinOnline
BRIEFS BY AUTHOR BRIEFS CASE NOTES BY AUTHOR CASE NOTES BY TITLE Page 1
Cumulative Index: Vols. 1-10 BRIEFS BY AUTHOR BEASLEY, VICKY L., DEVON W …

Distributed transfer network learning based intrusion detection

S Gou, Y Wang, L Jiao, J Feng… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
In order to solve the problem that there exists unbalanced detection performance on different
types of attacks in current large-scale network intrusion detection algorithms, Distributed …

[PDF][PDF] Intrusion detection and attack classifier based on three techniques: a comparative study

A Brifcani, A Issa - Eng. & Tech. Journal, 2011 - iasj.net
Different soft-computing based methods have been proposed in recent years for the
development of intrusion detection systems. The purpose of this work is to development …

[PDF][PDF] Improved support vector machine for cyber attack detection

S Singh, S Agrawal, MA Rizvi… - Proceedings of the World …, 2011 - academia.edu
This paper presents an efficient and scalable algorithm for classification of cyber attack. The
performance of traditional SVM is enhanced in this work by modifying Gaussian kernel to …

Cyber attack detection system based on improved support vector machine

S Singh, S Silakari - International Journal of Security and Its Applications, 2015 - earticle.net
This paper presents a novel cyber attack classification approach using improved Support
Vector Machine (iSVM) by modifying Gaussian kernel. The Support Vector Machine (SVM) is …

KFDA and clustering based multiclass SVM for intrusion detection

Y WEI, M WU - The journal of china universities of posts and …, 2008 - Elsevier
To improve the classification accuracy and reduce the training time, an intrusion detection
technology is proposed, which combines feature extraction technology and multiclass …

KFDA-waveletcluster based intrusion detection technology

YX Wei, MQ Wu - … Conference on Wavelet Analysis and Pattern …, 2007 - ieeexplore.ieee.org
In this paper, we propose a new intrusion detection technology which combines feature
extraction with wavelet clustering method. Our intrusion detection model setup has two …

[PDF][PDF] Hybrid Fuzzy Techniques for Unsupervised Intrusion Detection System

W CHIMPHLEE - 2008 - eprints.utm.my
Network intrusion detection is a complex research problem especially when it deals with
unknown patterns. Furthermore, if the amount of audit data instances is large, human …

[PDF][PDF] International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net

M Kumar, VK Katiyar - 2013 - academia.edu
This paper presents the study of fluid flow and heat transfer in a plain rectangular duct of a
solar air heater by using Computational Fluid Dynamics (CFD). The effect of Reynolds …

[PDF][PDF] APPLICATION OF PARTIAL-CONNECTED DYNAMIC AND GAOPTIMIZED NEURAL NETWORKS TO MISUSE DETECTION USING CATEGORIZED AND …

M Sheikhan, Z Jadidi, A Farrokhi - 2011 - sid.ir
APPLICATION OF PARTIAL-CONNECTED DYNAMIC AND GAOPTIMIZED NEURAL
NETWORKS TO MISUSE DETECTION USING CATEGORIZED AND RANKED INPUT Page 1 …