Author of the publication

Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection.

, and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 1-15. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing email classification using data reduction and disagreement-based semi-supervised learning., , and . ICC, page 622-627. IEEE, (2014)The practice on using machine learning for network anomaly intrusion detection.. ICMLC, page 576-581. IEEE, (2011)A case study: Intelligent false alarm reduction using fuzzy if-then rules in network intrusion detection., and . FSKD, page 505-509. IEEE, (2012)Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection., and . IAS, page 74-79. IEEE, (2011)Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion Detection., , and . HPCC/EUC, page 175-182. IEEE, (2013)Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection., and . NSS, volume 7645 of Lecture Notes in Computer Science, page 1-14. Springer, (2012)Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection., and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 1-15. Springer, (2013)Evaluating the effect of user guidelines on creating click-draw based graphical passwords., and . RACS, page 322-327. ACM, (2012)Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones., , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 55-68. Springer, (2013)Enhancing False Alarm Reduction Using Voted Ensemble Selection in Intrusion Detection., and . Int. J. Comput. Intell. Syst., 6 (4): 626-638 (2013)