Immune-genetic algorithm(IGA) with local search for intrusion detection system in computer network / Hamizan Suhaimi, Saiful Izwan Suliman, and Ismail Musirin
The Internet provides almost unlimited connectivity to the online world that is widely used in our daily lives nowadays. As for borderless connections, inventors have to face great challenges in providing the greatest quality of service specifically in terms of security. Even with existing security...
Main Authors: | Suhaimi, Hamizan (Author), Suliman, Saiful Izwan (Author), Musirin, Ismail (Author) |
---|---|
Format: | Article |
Language: | English |
Published: |
Universiti Teknologi MARA,
2021-04.
|
Subjects: | |
Online Access: | Get fulltext View Fulltext in UiTM IR |
Similar Items
-
An effective methodology to traceback DDoS attackers.
Published: (2003) -
A Methodology for Detecting and Classifying Rootkit Exploits
by: Levine, John G. (John Glenn)
Published: (2005) -
Virtuous Hackers: developing ethical sensitivity in a community of practice
by: Paula Roberts, et al.
Published: (2002-05-01) -
Network security performance analysis of Mobile Voice Over Ip Application (mVoIP): Kakao Talk, WhatsApp, Telegram and Facebook Messenger / Nur Khairani Kamarudin ... [et al.]
by: Kamarudin, Nur Khairani, et al.
Published: (2020) -
Reducing honeypot log storage capacity consumption - cron job with perl-script approach / Iman Hazwam Bin Abd Halim ... [et al.]
by: Abd Halim, Iman Hazwam, et al.
Published: (2019)