Author
AN Author - Proc. 12 th Int. Zeolite Conf, 1998 - HeinOnline
BRIEFS BY AUTHOR BRIEFS CASE NOTES BY AUTHOR CASE NOTES BY TITLE Page 1
Cumulative Index: Vols. 1-10 BRIEFS BY AUTHOR BEASLEY, VICKY L., DEVON W …
Cumulative Index: Vols. 1-10 BRIEFS BY AUTHOR BEASLEY, VICKY L., DEVON W …
Distributed transfer network learning based intrusion detection
In order to solve the problem that there exists unbalanced detection performance on different
types of attacks in current large-scale network intrusion detection algorithms, Distributed …
types of attacks in current large-scale network intrusion detection algorithms, Distributed …
[PDF][PDF] Intrusion detection and attack classifier based on three techniques: a comparative study
A Brifcani, A Issa - Eng. & Tech. Journal, 2011 - iasj.net
Different soft-computing based methods have been proposed in recent years for the
development of intrusion detection systems. The purpose of this work is to development …
development of intrusion detection systems. The purpose of this work is to development …
[PDF][PDF] Improved support vector machine for cyber attack detection
This paper presents an efficient and scalable algorithm for classification of cyber attack. The
performance of traditional SVM is enhanced in this work by modifying Gaussian kernel to …
performance of traditional SVM is enhanced in this work by modifying Gaussian kernel to …
Cyber attack detection system based on improved support vector machine
S Singh, S Silakari - International Journal of Security and Its Applications, 2015 - earticle.net
This paper presents a novel cyber attack classification approach using improved Support
Vector Machine (iSVM) by modifying Gaussian kernel. The Support Vector Machine (SVM) is …
Vector Machine (iSVM) by modifying Gaussian kernel. The Support Vector Machine (SVM) is …
KFDA and clustering based multiclass SVM for intrusion detection
Y WEI, M WU - The journal of china universities of posts and …, 2008 - Elsevier
To improve the classification accuracy and reduce the training time, an intrusion detection
technology is proposed, which combines feature extraction technology and multiclass …
technology is proposed, which combines feature extraction technology and multiclass …
KFDA-waveletcluster based intrusion detection technology
YX Wei, MQ Wu - … Conference on Wavelet Analysis and Pattern …, 2007 - ieeexplore.ieee.org
In this paper, we propose a new intrusion detection technology which combines feature
extraction with wavelet clustering method. Our intrusion detection model setup has two …
extraction with wavelet clustering method. Our intrusion detection model setup has two …
[PDF][PDF] Hybrid Fuzzy Techniques for Unsupervised Intrusion Detection System
W CHIMPHLEE - 2008 - eprints.utm.my
Network intrusion detection is a complex research problem especially when it deals with
unknown patterns. Furthermore, if the amount of audit data instances is large, human …
unknown patterns. Furthermore, if the amount of audit data instances is large, human …
[PDF][PDF] International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net
M Kumar, VK Katiyar - 2013 - academia.edu
This paper presents the study of fluid flow and heat transfer in a plain rectangular duct of a
solar air heater by using Computational Fluid Dynamics (CFD). The effect of Reynolds …
solar air heater by using Computational Fluid Dynamics (CFD). The effect of Reynolds …
[PDF][PDF] APPLICATION OF PARTIAL-CONNECTED DYNAMIC AND GAOPTIMIZED NEURAL NETWORKS TO MISUSE DETECTION USING CATEGORIZED AND …
APPLICATION OF PARTIAL-CONNECTED DYNAMIC AND GAOPTIMIZED NEURAL
NETWORKS TO MISUSE DETECTION USING CATEGORIZED AND RANKED INPUT Page 1 …
NETWORKS TO MISUSE DETECTION USING CATEGORIZED AND RANKED INPUT Page 1 …