Author of the publication

A case study: Intelligent false alarm reduction using fuzzy if-then rules in network intrusion detection.

, and . FSKD, page 505-509. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The practice on using machine learning for network anomaly intrusion detection.. ICMLC, page 576-581. IEEE, (2011)Enhancing email classification using data reduction and disagreement-based semi-supervised learning., , and . ICC, page 622-627. IEEE, (2014)Intrusion Detection Using Disagreement-Based Semi-supervised Learning: Detection Enhancement and False Alarm Reduction., and . CSS, volume 7672 of Lecture Notes in Computer Science, page 483-497. Springer, (2012)Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme., and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 349-356. Springer, (2012)Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges., , and . CIS, page 518-522. IEEE Computer Society, (2013)Improving the Performance of Neural Networks with Random Forest in Detecting Network Intrusions., and . ISNN (2), volume 7952 of Lecture Notes in Computer Science, page 622-629. Springer, (2013)Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection., , and . SecureComm, volume 106 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 203-221. Springer, (2012)Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection., , and . NSS, volume 7873 of Lecture Notes in Computer Science, page 40-53. Springer, (2013)Intelligent Alarm Filter Using Knowledge-Based Alert Verification in Network Intrusion Detection., , and . ISMIS, volume 7661 of Lecture Notes in Computer Science, page 115-124. Springer, (2012)Enhancing False Alarm Reduction Using Voted Ensemble Selection in Intrusion Detection., and . Int. J. Comput. Intell. Syst., 6 (4): 626-638 (2013)