The issue that this study addresses is the high rate of false positives, high maintenance, and lack of stability and precision that the existing network intrusion detection algorithm faces. To address this problem, we proposed a Local Outlier Factor (LOF) Algorithm that locates outliers and anomalies by comparing the deviation of one data point with respect to its neighbors. To gather data, we will use DARPA’s KDDCup99 as well as questions towards analysts. This data will help determine whether the LOF algorithm is more effective than existing solutions that are presented in the network intrusion detection space
In this paper, three types of traffic noise barriers, interlocking steel panels, precast concrete pa...
This paper presents the results of a research study related to the Navy and Marine Corps Intranet (N...
Homeland Security, sponsored by governmental initiatives, has become a vibrant academic research fie...
The growth of android applications is causing a threat and a serious issue towards Android’s securit...
The purpose of this study was to analyze local law enforcement\u27s counter-terrorism capabilities a...
This thesis studies the properties of distance-based outliers and a better detection method for larg...
Research into the combination of data mining and machine learning technology with web-based educatio...
Surveillance studies suffer from a near-total lack of empirical data, partially due to the highly se...
This thesis studies the empirical analysis of two algorithms, Uplattice and Jumplattice for mining i...
Posterior predictive model checks (PPMC) are one Bayesian model-data fit approach. Thus far, PPMC fo...
Past research has found that errors made when acting on magnitude information is influenced by irrel...
Scholars have noted a recent accumulation of innovations in policing (Bayley, 1994; Weisburd & Braga...
Master of ScienceDepartment of PsychologySatoris S. CulbertsonPerformance appraisals are an importan...
Various factors may cause non-task fingers to involuntary move during task finger movement. Finger i...
Infrastructure flow networks, such as water pipelines, power distribution systems, etc., play an imp...
In this paper, three types of traffic noise barriers, interlocking steel panels, precast concrete pa...
This paper presents the results of a research study related to the Navy and Marine Corps Intranet (N...
Homeland Security, sponsored by governmental initiatives, has become a vibrant academic research fie...
The growth of android applications is causing a threat and a serious issue towards Android’s securit...
The purpose of this study was to analyze local law enforcement\u27s counter-terrorism capabilities a...
This thesis studies the properties of distance-based outliers and a better detection method for larg...
Research into the combination of data mining and machine learning technology with web-based educatio...
Surveillance studies suffer from a near-total lack of empirical data, partially due to the highly se...
This thesis studies the empirical analysis of two algorithms, Uplattice and Jumplattice for mining i...
Posterior predictive model checks (PPMC) are one Bayesian model-data fit approach. Thus far, PPMC fo...
Past research has found that errors made when acting on magnitude information is influenced by irrel...
Scholars have noted a recent accumulation of innovations in policing (Bayley, 1994; Weisburd & Braga...
Master of ScienceDepartment of PsychologySatoris S. CulbertsonPerformance appraisals are an importan...
Various factors may cause non-task fingers to involuntary move during task finger movement. Finger i...
Infrastructure flow networks, such as water pipelines, power distribution systems, etc., play an imp...
In this paper, three types of traffic noise barriers, interlocking steel panels, precast concrete pa...
This paper presents the results of a research study related to the Navy and Marine Corps Intranet (N...
Homeland Security, sponsored by governmental initiatives, has become a vibrant academic research fie...