Author of the publication

Using Rough Set and Support Vector Machine for Network Intrusion Detection

, , and . International Journal of Network Security & Its Applications (IJNSA), 01 (01): 01-13 (April 2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Security Method in MQTT Protocol for Internet of Things., and . TAAI, page 280-284. IEEE, (2021)Using Rough Set and Support Vector Machine for Network Intrusion Detection System., , , and . ACIIDS, page 465-470. IEEE Computer Society, (2009)Reliability Enhancement of Mobile Edge Computing for the IoT with Multiple Damage Communication., , and . ICNC-FSKD, volume 1075 of Advances in Intelligent Systems and Computing, page 825-832. Springer, (2019)Using Rough Set and Support Vector Machine for Network Intrusion Detection, , and . International Journal of Network Security & Its Applications (IJNSA), 01 (01): 01-13 (April 2009)An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks., , and . J. Networks, 5 (3): 335-342 (2010)Applying an Ontology to a Patrol Intrusion Detection System for Wireless Sensor Networks., , and . Int. J. Distributed Sens. Networks, (2014)MLNN: A Novel Network Intrusion Detection Based on Multilayer Neural Network., and . TAAI, page 43-48. IEEE, (2021)A Light-Weight Ranger Intrusion Detection System on Wireless Sensor Networks., , and . ICGEC, page 49-52. IEEE Computer Society, (2011)A new method for intrusion detection on hierarchical wireless sensor networks., , and . ICUIMC, page 238-245. ACM, (2009)Reliability Enhancement of Edge Computing Paradigm Using Agreement., , , and . Symmetry, 11 (2): 167 (2019)