7 found
Order:
  1.  5
    An empirical study on vulnerability assessment and penetration detection for highly sensitive networks.Mehedi Masud, Roobaea Alroobaea, Gurjot Singh Gaba, Fahad M. Almansour, Robert Abbas & Liwei Wang - 2021 - Journal of Intelligent Systems 30 (1):592-603.
    With the advancement of internet and the emergence of network globalization, security has always been a major concern. During the trial operation, the management control platform discussed in this article included more than 600 network security vulnerabilities in the industry, with dozens of incidents, which were promptly dealt with and rectified, effectively improving the level of network security management and protection in the industry. As networks are very much vulnerable to denial of service attacks, much more emphasis has been given (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  7
    Application of data mining technology in detecting network intrusion and security maintenance.Mehedi Masud, Roobaea Alroobaea, Fahad M. Almansour, Gurjot Singh Gaba & Yongkuan Zhu - 2021 - Journal of Intelligent Systems 30 (1):664-676.
    In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect. This work proposes an improved k-means algorithm and an improved Apriori algorithm applied in data mining technology to detect network intrusion and security maintenance. The classical KDDCUP99 dataset has been utilized in this work for performing the experimentation with the improved algorithms. The algorithm’s detection rate and false alarm rate are compared with the experimental data before the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  13
    An improved association rule mining algorithm for large data.Saeed Rubaiee, Mehedi Masud, Roobaea Alroobaea, Gurjot Singh Gaba, Zhou Jian & Zhenyi Zhao - 2021 - Journal of Intelligent Systems 30 (1):750-762.
    The data with the advancement of information technology are increasing on daily basis. The data mining technique has been applied to various fields. The complexity and execution time are the major factors viewed in existing data mining techniques. With the rapid development of database technology, many data storage increases, and data mining technology has become more and more important and expanded to various fields in recent years. Association rule mining is the most active research technique of data mining. Data mining (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  10
    Aiding Traffic Prediction Servers through Self-Localization to Increase Stability in Complex Vehicular Clustering.Iftikhar Ahmad, Rafidah Md Noor, Roobaea Alroobaea, Muhammad Talha, Zaheed Ahmed, Umm-E.- Habiba & Ihsan Ali - 2021 - Complexity 2021:1-11.
    The integration of cellular networks and vehicular networks is complex and heterogeneous. Synchronization among vehicles in heterogeneous vehicular clusters plays an important role in effective data sharing and the stability of the cluster. This synchronization depends on the smooth exchange of information between vehicles and remote servers over the Internet. The remote servers predict road traffic patterns by adopting deep learning methods to help drivers on the roads. At the same time, local data processing at the vehicular cluster level may (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  7
    Implementation of network information security monitoring system based on adaptive deep detection.Lavish Kansal, Abdullah M. Baqasah, Roobaea Alroobaea & Jing Niu - 2022 - Journal of Intelligent Systems 31 (1):454-465.
    For a better detection in Network information security monitoring system, the author proposes a method based on adaptive depth detection. A deep belief network was designed and implemented, and the intrusion detection system model was combined with a support vector machine. The data set adopts the NSL-KDD network communication data set, and this data set is authoritative in the security field. Redundant cleaning, data type conversion, normalization, and other processing operations are performed on the data set. Using the data conversion (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  10
    A Comprehensive Skills Analysis of Novice Software Developers Working in the Professional Software Development Industry.Imdad Ahmad Mian, Undefined Ijaz-Ul-Haq, Aamir Anwar, Roobaea Alroobaea, Syed Sajid Ullah, Fahad Almansour & Fazlullah Umar - 2022 - Complexity 2022:1-12.
    Measuring and evaluating a learner’s learning ability is always the focus of every person whose aim is to develop strategies and plans for their learners to improve the learning process. For example, classroom assessments, self-assessment using computer systems such as Intelligent Tutoring Systems, and other approaches are available. Assessment of metacognition is one of these techniques. Having the ability to evaluate and monitor one’s learning is known as metacognition. An individual can then propose adjustments to their learning process based on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  9
    Research on data mining method of network security situation awareness based on cloud computing.Rajan Miglani, Abdullah M. Baqasah, Roobaea Alroobaea, Guodong Zhao & Ying Zhou - 2022 - Journal of Intelligent Systems 31 (1):520-531.
    Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and co-filtering technology. Knowledge and information about the security situation (...)
    Direct download  
     
    Export citation  
     
    Bookmark