Behavioral Intrusion Prediction Model on Bayesian Network over Healthcare Infrastructure
Due to polymorphic nature of malware attack, a signature-based analysis is no longer sufficient to solve polymorphic and stealth nature ofmalware attacks. On the other hand, state-of-the-art methods like deep learning require labelled dataset as a target to train a supervised model. This is unlikely...
Published in: | Computers, Materials and Continua |
---|---|
Main Author: | Mohd Yusof M.H.; Mohd Zin A.; Mohd Satar N.S. |
Format: | Article |
Language: | English |
Published: |
Tech Science Press
2022
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85127342461&doi=10.32604%2fcmc.2022.023571&partnerID=40&md5=2e2ba081c6d0bbdf7a8fcc413a93e3cb |
Similar Items
-
From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
by: Anwar S.; Zain J.M.; Zolkipli M.F.; Inayat Z.; Khan S.; Anthony B.; Chang V.
Published: (2017) -
Network intrusion detection system using immune-genetic algorithm (IGA)
by: Suhaimi H.; Suliman S.I.; Musirin I.; Harun A.; Mohamad R.; Kassim M.; Shahbudin S.
Published: (2019) -
Performance of Bayesian Model Averaging (BMA) for Short-Term Prediction of PM10 Concentration in the Peninsular Malaysia
by: Ramli N.; Abdul Hamid H.; Yahaya A.S.; Ul-Saufie A.Z.; Mohamed Noor N.; Abu Seman N.A.; Kamarudzaman A.N.; Deák G.
Published: (2023) -
Enhancing solar energy conversion efficiency: Thermophysical property predicting of MXene/Graphene hybrid nanofluids via bayesian-optimized artificial neural networks
by: jasim D.J.; Rajab H.; Alizadeh A.; Sharma K.; Ahmed M.; Kassim M.; AbdulAmeer S.; Alwan A.A.; Salahshour S.; Maleki H.
Published: (2024) -
Non-intrusive SSL/TLS proxy implementation and issues
by: Jawi S.M.; Ali F.H.M.
Published: (2015)