Prediction of network attacks and machine understandable security vulnerabilities are complex tasks for current available Intrusion Detection System [IDS]. IDS software is important for an enterprise network. It logs security information occurred in the network. In addition, IDSs are useful in recognizing malicious hack attempts, and protecting it without the need for change to client‟s software. Several researches in the field of machine learning have been applied to make these IDSs better a d smarter. In our work, we propose approach for making IDSs more analytical, using semantic technology. We made a useful semantic connection between IDSs and National Vulnerability Databases [NVDs], to make the system semantically analyzed each attack...
BiOS is a web-based open source billing application, which is made specially for Linux based comput...
Distributed Denial of Service (DDoS) attacks are very common type of computer attack in the world ...
This project made several key improvements to the distance education application OfCourse. Research ...
This project is about designing and developing a system, Student’s Attendance System (SAS) that wi...
The use of behavioral targeting practices provides ad networks with the opportunity to tailor ads to...
House Rental Mobile Application for UiTM Jasin (JHORMAP) is an Android based mobile application that...
The development of this project is meant for the students of UiTM Melaka Kampus Jasin. Through an ob...
Pattern matching is at the core of many computational problems, e.g., search engine, data mining, ne...
Hardware security is a serious emerging concern in chip designs and applications. Due to the globali...
abstract: With the rise of mobile technology, the personal lives and sensitive information of everyd...
A human being can differentiate between various objects by observing their shape, color, texture, an...
This project is aimed to have an NIDS (Snort) intrusion notification via SMS in the real time. In o...
As the first step to defend against DoS attacks, Network-based Intrusion Detection System is well ex...
This thesis addresses the problem of local intrusion detection for SCADA (Supervisory Control and Da...
We usually more easyer learn some thing if has a simulation. The simulation will make we easy imagi...
BiOS is a web-based open source billing application, which is made specially for Linux based comput...
Distributed Denial of Service (DDoS) attacks are very common type of computer attack in the world ...
This project made several key improvements to the distance education application OfCourse. Research ...
This project is about designing and developing a system, Student’s Attendance System (SAS) that wi...
The use of behavioral targeting practices provides ad networks with the opportunity to tailor ads to...
House Rental Mobile Application for UiTM Jasin (JHORMAP) is an Android based mobile application that...
The development of this project is meant for the students of UiTM Melaka Kampus Jasin. Through an ob...
Pattern matching is at the core of many computational problems, e.g., search engine, data mining, ne...
Hardware security is a serious emerging concern in chip designs and applications. Due to the globali...
abstract: With the rise of mobile technology, the personal lives and sensitive information of everyd...
A human being can differentiate between various objects by observing their shape, color, texture, an...
This project is aimed to have an NIDS (Snort) intrusion notification via SMS in the real time. In o...
As the first step to defend against DoS attacks, Network-based Intrusion Detection System is well ex...
This thesis addresses the problem of local intrusion detection for SCADA (Supervisory Control and Da...
We usually more easyer learn some thing if has a simulation. The simulation will make we easy imagi...
BiOS is a web-based open source billing application, which is made specially for Linux based comput...
Distributed Denial of Service (DDoS) attacks are very common type of computer attack in the world ...
This project made several key improvements to the distance education application OfCourse. Research ...