Skip to content
VuFind
Advanced
  • AIRSE : an approach for attack...
  • Cite this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
  • Permanent link
AIRSE : an approach for attack intention recognition based on similarity of evidences

AIRSE : an approach for attack intention recognition based on similarity of evidences

Sensitive information can be exposed to critical risks when communicated through computer networks. The ability of attackers in hiding their attacks' intention obstructs existing protection systems to early prevent their attacks and avoid any possible sabotage in network systems. In this paper,...

Full description

Bibliographic Details
Main Authors: Ahmed, Abdulghani Ali, Noorul Ahlami, Kamarul Zaman
Format: Conference or Workshop Item
Language:English
English
Published: EAI 2017
Subjects:
QA76 Computer software
Online Access:http://umpir.ump.edu.my/id/eprint/27010/
http://umpir.ump.edu.my/id/eprint/27010/
http://umpir.ump.edu.my/id/eprint/27010/1/AIRSE%20-%20an%20approach%20for%20attack%20intention%20recognition%20based.pdf
http://umpir.ump.edu.my/id/eprint/27010/7/AIRSE%20an%20approach%20for%20attack%20intention%20recognition%20based%20on%20similarity%20of%20evidences.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://umpir.ump.edu.my/id/eprint/27010/
http://umpir.ump.edu.my/id/eprint/27010/
http://umpir.ump.edu.my/id/eprint/27010/1/AIRSE%20-%20an%20approach%20for%20attack%20intention%20recognition%20based.pdf
http://umpir.ump.edu.my/id/eprint/27010/7/AIRSE%20an%20approach%20for%20attack%20intention%20recognition%20based%20on%20similarity%20of%20evidences.pdf

Similar Items

  • Attack Intention Recognition: A Review
    by: Ahmed, Abdulghani Ali, et al.
    Published: (2017)
  • Investigation Model for Ddos Attack Detection in Real-Time
    by: Ahmed, Abdulghani Ali
    Published: (2015)
  • Filtration Model For DDoS Attack Detection in Real-Time
    by: Ahmed, Abdulghani Ali
    Published: (2015)
  • Collaborative Filtering Similarity Measures: Revisiting
    by: Al-Bashiri, Hael, et al.
    Published: (2017)
  • Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
    by: Fahad, Ahmed Mohammed, et al.
    Published: (2019)

Search Options

  • Advanced Search

Find More

  • Browse the Catalog

Need Help?

  • Search Tips
Cannot write session to /tmp/vufind_sessions/sess_ti4bku5lfkn9gqr4ja0qqe2f24