Order:
  1.  5
    An empirical study on vulnerability assessment and penetration detection for highly sensitive networks.Mehedi Masud, Roobaea Alroobaea, Gurjot Singh Gaba, Fahad M. Almansour, Robert Abbas & Liwei Wang - 2021 - Journal of Intelligent Systems 30 (1):592-603.
    With the advancement of internet and the emergence of network globalization, security has always been a major concern. During the trial operation, the management control platform discussed in this article included more than 600 network security vulnerabilities in the industry, with dozens of incidents, which were promptly dealt with and rectified, effectively improving the level of network security management and protection in the industry. As networks are very much vulnerable to denial of service attacks, much more emphasis has been given (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  7
    Application of data mining technology in detecting network intrusion and security maintenance.Mehedi Masud, Roobaea Alroobaea, Fahad M. Almansour, Gurjot Singh Gaba & Yongkuan Zhu - 2021 - Journal of Intelligent Systems 30 (1):664-676.
    In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect. This work proposes an improved k-means algorithm and an improved Apriori algorithm applied in data mining technology to detect network intrusion and security maintenance. The classical KDDCUP99 dataset has been utilized in this work for performing the experimentation with the improved algorithms. The algorithm’s detection rate and false alarm rate are compared with the experimental data before the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  14
    An improved association rule mining algorithm for large data.Saeed Rubaiee, Mehedi Masud, Roobaea Alroobaea, Gurjot Singh Gaba, Zhou Jian & Zhenyi Zhao - 2021 - Journal of Intelligent Systems 30 (1):750-762.
    The data with the advancement of information technology are increasing on daily basis. The data mining technique has been applied to various fields. The complexity and execution time are the major factors viewed in existing data mining techniques. With the rapid development of database technology, many data storage increases, and data mining technology has become more and more important and expanded to various fields in recent years. Association rule mining is the most active research technique of data mining. Data mining (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation