On the detection capabilities of signature-based intrusion detection systems in the context of web attacks
Signature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal of
security components of most organizations. They can find traces of known attacks in the …
security components of most organizations. They can find traces of known attacks in the …
Intelligent agents defending for an IoT world: A review
Transition to the Internet of Things (IoT) is progressing without realization. In light of this
securing traditional systems is still a challenging role requiring a mixture of solutions which …
securing traditional systems is still a challenging role requiring a mixture of solutions which …
Software complexity analysis using halstead metrics
T Hariprasad, G Vidhyagaran, K Seenu… - … on Trends in …, 2017 - ieeexplore.ieee.org
Software Complexity influences inward connections. Higher the multifaceted nature, bigger
the deformities. Programming complexity for any product or a program is hard to discover …
the deformities. Programming complexity for any product or a program is hard to discover …
Heuristic prediction of rainfall using machine learning techniques
This paper is carried on the heuristic prediction of rainfall using machine learning
techniques. As we know agriculture was the predominant of our country and economy. While …
techniques. As we know agriculture was the predominant of our country and economy. While …
NTLFlowLyzer: Towards generating an intrusion detection dataset and intruders behavior profiling through network and transport layers traffic analysis and pattern …
Network security remains a critical concern in modern computing systems due to the
constant emergence of threats and attacks. This paper introduces a comprehensive …
constant emergence of threats and attacks. This paper introduces a comprehensive …
Calculating the user-item similarity using Pearson's and cosine correlation
In this paper, we look into three different techniques for computing similarities for obtaining a
recommendation for them. There are a number of different mathematical formulations that …
recommendation for them. There are a number of different mathematical formulations that …
Data analysis using box and whisker plot for stationary shop analysis
V Vignesh, D Pavithra, K Dinakaran… - … on Trends in …, 2017 - ieeexplore.ieee.org
In statistical analysis, we have a collection of data, with the use of these data, we have to do
analysis based on our requirements. With the collection of data using Statistical analysis, we …
analysis based on our requirements. With the collection of data using Statistical analysis, we …
Nature inspired algorithm
TA Adithyan, V Sharma, B Gururaj… - … conference on trends …, 2017 - ieeexplore.ieee.org
Nature-inspired algorithms are a set of novel problem-solving methodologies and
approaches and have been attracting considerable attention for their good performance …
approaches and have been attracting considerable attention for their good performance …
Data analysis using box plot and control chart for air quality
V Praveen, TD Narendran, R Pavithran… - … on Trends in …, 2017 - ieeexplore.ieee.org
Contains the responses of a gas multi-sensor device deployed on the field in an Italian city.
Hourly responses averages are recorded along with gas concentrations references from a …
Hourly responses averages are recorded along with gas concentrations references from a …
Analyzing complexity nature inspired optimization algorithms using halstead metrics
M Madhan, I Dhivakar, T Anbuarasan… - … on Trends in …, 2017 - ieeexplore.ieee.org
Nowadays the research is focusing on new software development and analyzing or
comparing the existing technologies. One of the rising zones of Software Engineering is …
comparing the existing technologies. One of the rising zones of Software Engineering is …