• Nenhum resultado encontrado

[PDF] Top 20 AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE SELECTION

Has 10000 "AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE SELECTION" found on our website. Below are the top 20 most common "AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE SELECTION".

AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE SELECTION

AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE SELECTION

... attack detection and considerable drop in false alarm ...proposed an approach for IDS with the use of Rank based feature selection and have shown that Support Vector Machines ... See full document

15

Design Hybrid method for intrusion detection using Ensemble cluster classification and SOM network

Design Hybrid method for intrusion detection using Ensemble cluster classification and SOM network

... is an effective means for distinguishing groups or classes of objects, it requires the often costly collection and labelling of a large set of training tuples or patterns which the classifier uses to model each ... See full document

7

A RECURRENT ELMAN NEURAL NETWORK - BASED APPROACH TO DETECT THE PRESENCE OF EPILEPTIC ATTACK IN ELECTROENCEPHALOGRAM (EEG) SIGNALS

A RECURRENT ELMAN NEURAL NETWORK - BASED APPROACH TO DETECT THE PRESENCE OF EPILEPTIC ATTACK IN ELECTROENCEPHALOGRAM (EEG) SIGNALS

... automated based on Elman Neural Network by using a time frequency domain characteristics of EEG signal called Approximate Entropy ...neural network. This proposed system proposes a ... See full document

4

TOPSIS Based Multi-Criteria Decision Making of Feature Selection Techniques for Network Traffic Dataset

TOPSIS Based Multi-Criteria Decision Making of Feature Selection Techniques for Network Traffic Dataset

... prepared intrusion detection dataset to use for performance analysis of ...against network security threats. Various network traffic like e-mail, telnet, web, was generated and captured to ... See full document

7

Design of an artificial neural network and feature extraction to identify arrhythmias from ECG

Design of an artificial neural network and feature extraction to identify arrhythmias from ECG

... of an artificial neural network (ANN) and feature extraction methods to identify two types of arrhythmias in datasets obtained through electrocardiography (ECG) signals, namely arrhythmia ... See full document

7

Intrusion Detection Systems Based On Packet Sniffing

Intrusion Detection Systems Based On Packet Sniffing

... of network systems is becoming increasingly important, as more and more sensitive information is being stored and manipulated ...the network wire and attempts to the discovery of hacker/cracker who is ... See full document

4

NIMEFI: gene regulatory network inference using multiple ensemble feature importance algorithms.

NIMEFI: gene regulatory network inference using multiple ensemble feature importance algorithms.

... into an actual network ...a network instead of a ranking while others leave the decision to the ...the network at various threshold levels. Some parts of the network can have a weaker ... See full document

13

NEURAL NETWORK APPROACH FOR EYE DETECTION

NEURAL NETWORK APPROACH FOR EYE DETECTION

... eye detection include wavelets, principal component analysis, fuzzy logic, evolutionary computation and hidden markov ...eye detection by using optimal wavelet packets for eye representation and ... See full document

13

REM, Int. Eng. J.  vol.71 número1

REM, Int. Eng. J. vol.71 número1

... as an economical and reliable excavation technique, but there are some environmental shortcomings such as the control of blast-induced vibra- ...been using a myriad of empirical predictive attenuation ...of ... See full document

7

Joel Dias Extended Abstract Final

Joel Dias Extended Abstract Final

... features, selection of features and classification of ...features’ selection that contain the most relevant information for the discrimination of the various ... See full document

7

Materialized View Selection Approach Using Tree Based Methodology

Materialized View Selection Approach Using Tree Based Methodology

... are based on random sampling, where a small random sample of the rows of the database is drawn, the query is executed on this small sample, and the results are extrapolated to the whole ...to an estimate of ... See full document

11

Cognitive Approach Based User Node Activity Monitoring for Intrusion Detection in Wireless Networks

Cognitive Approach Based User Node Activity Monitoring for Intrusion Detection in Wireless Networks

... are: Network Complexity: The introduction of wireless links in the network increases the complexity because of number of nodes and alternate routes and as well as the number of communication mediums and ... See full document

8

An Integrated Intelligent Neuro-Fuzzy Algorithm for Long-Term Electricity Consumption: Cases of Selected EU Countries

An Integrated Intelligent Neuro-Fuzzy Algorithm for Long-Term Electricity Consumption: Cases of Selected EU Countries

... presented an ANFIS approach for long term electricity consumption ...ANFIS approach indicates that the proposed models are suitable and accurate for predicting electricity demand in industrialized ... See full document

20

“Economic Load Dispatch by Generating Units under Varying Load Demands Using Artificial Neural Network”

“Economic Load Dispatch by Generating Units under Varying Load Demands Using Artificial Neural Network”

... the network in which signal flows from input layer to output layer neurons, but not vice versa or in other words network is strictly a feed forward or acyclic ...Such network is called a single layer ... See full document

9

Selection Of High Performing Geometry In Flexure Bearings For Linear Compressor Applications Using Fea.

Selection Of High Performing Geometry In Flexure Bearings For Linear Compressor Applications Using Fea.

... [2] Saurabh Malpani, Yogesh Yenarkar, Dr. Suhas Deshmukh, S P Tak, D.V. Bhope ―Design OF Flexure Bearing For Linear Compressor by Optimization Procedure Using FEA‖, International Journal of Engineering Science and ... See full document

4

A divide-and-conquer strategy using feature relevance and expert knowledge for enhancing a data mining approach to bank telemarketing

A divide-and-conquer strategy using feature relevance and expert knowledge for enhancing a data mining approach to bank telemarketing

... relevant feature from the top five DM model DSA analysis, was considered the most relevant for both the telemarketing and the information systems ...relevant feature, with the call direction in ...relevant ... See full document

31

Fuzzy logic based approach for object feature tracking

Fuzzy logic based approach for object feature tracking

... perform an accurate ...of feature detection and matching as in classical methods and, the decision block is performed by a fuzzy inference engine that incorporates human ...the feature ... See full document

169

Feature selection for chemical sensor arrays using mutual information.

Feature selection for chemical sensor arrays using mutual information.

... selected based on some metrics that directly characterise those features and the process is independent of the learning and inference ...Consequently, feature selection needs only to be performed ... See full document

17

Advanced persistent threats

Advanced persistent threats

... and detection of C&C ...the network is setup and how the analysis would be made at the sandbox, since an exploit on application x version y running on operating sys- tem z may not work in any ... See full document

94

Dynamic Reputation Based Trust Management Using Neural Network Approach

Dynamic Reputation Based Trust Management Using Neural Network Approach

... As a result of the previous phase, peer A receives a set of votes, where, for each peer in T, some votes can express a good opinion while some others can express a bad opinion. To base its decision on the votes received, ... See full document

5

Show all 10000 documents...