[PDF][PDF] International journal of advanced research in computer science and software engineering

AB Angadi, AB Angadi, KC Gull - International Journal, 2013 - academia.edu
Relational database management systems (RDMBSs) today are the predominant
technology for storing. In the past few years, the” one size fits all “-thinking concerning …

[PDF][PDF] Feature selection approach for intrusion detection system

K Kumar, G Kumar, Y Kumar - International Journal of Advanced …, 2013 - academia.edu
At present, network security needs to be concerned to provide secure information channels
due to increase in potential network attacks. Intrusion Detection System (IDS) is a valuable …

A validity-based approach for feature selection in systems

E Hmouda - 2022 - search.proquest.com
Intrusion detection systems are tools that detect and remedy the presence of malicious
activities. Intrusion detection systems face many challenges in terms of accurate analysis …

Combinational feature selection approach for network intrusion detection system

T Garg, Y Kumar - … Conference on Parallel, Distributed and Grid …, 2014 - ieeexplore.ieee.org
In the era of digital world, the computer networks are receiving multidimensional
advancements. Due to these advancements more and more services are available for …

[PDF][PDF] Adaptive AP clustering algorithm and its application on intrusion detection

J Jiang, ZF Wang, TM Chen… - Journal on …, 2015 - infocomm-journal.com
The massive traffic of network data flow deteriorates the real-time performance for intrusion
detection system, therefore compressing the train data can speed up the efficiency on …

Statistical entropy measures in C4. 5 trees

AR Arellano, J Bory-Reyes… - International Journal of …, 2018 - igi-global.com
The main goal of this article is to present a statistical study of decision tree learning
algorithms based on the measures of different parametric entropies. Partial empirical …

Validity based approach for feature selection in intrusion detection systems

E Hmouda, W Li - 2020 SoutheastCon, 2020 - ieeexplore.ieee.org
Computer networks are vulnerable to growing number of security threats. The increase of
attacks has caused obvious damages throughout the network at individual, enterprise, and …

自适应 AP 聚类算法及其在入侵检测中的应用

江颉, 王卓芳, 陈铁明, 朱陈晨, 陈波 - 通信学报, 2015 - infocomm-journal.com
The massive traffic of network data flow deteriorates the real-time performance for intrusion
detection system, therefore compressing the train data can speed up the efficiency on …

Advancements in Gait Recognition: A Study on Gait Energy Images and Gait Entropy Images.

S Dumenčić, D Pinčić, D Sušanj… - Electrotechnical …, 2024 - search.ebscohost.com
Gait recognition is a promising biometric modality due to its non-invasive nature and
difficulty to disguise. However, the performance still lacks compared to other, well …

Functional Categorization of Disease Genes Based on Spectral Graph Theory and Integrated Biological Knowledge

A Sreeja, U Krishnakumar, KP Vinayan - … Sciences: Computational Life …, 2019 - Springer
Interaction of multiple genetic variants is a major challenge in the development of effective
treatment strategies for complex disorders. Identifying the most promising genes enhances …