Rahman, 2008 - Google Patents
WiFi Miner: An online apriori and sensor based wireless network Intrusion Detection SystemRahman, 2008
View PDF- Document ID
- 7325726679663394862
- Author
- Rahman S
- Publication year
External Links
Snippet
This thesis proposes an Intrusion Detection System, WiFi Miner, which applies an infrequent pattern association rule mining Apriori technique to wireless network packets captured through hardware sensors for purposes of real time detection of intrusive or anomalous …
- 238000001514 detection method 0 title abstract description 203
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Karygiannis et al. | Wireless Network Security:. | |
Thaseen et al. | Network intrusion detection using machine learning techniques | |
Shi et al. | Dynamic distributed honeypot based on blockchain | |
Gupta et al. | Computational intelligence based intrusion detection systems for wireless communication and pervasive computing networks | |
Ahmed et al. | A survey of IoT security threats and defenses | |
US7577424B2 (en) | Systems and methods for wireless vulnerability analysis | |
Santos et al. | A flow-based intrusion detection framework for internet of things networks | |
Zhang et al. | A survey of security visualization for computer network logs | |
Mohammed et al. | Automatic defense against zero-day polymorphic worms in communication networks | |
Thankappan et al. | A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks | |
Patel et al. | A snort-based secure edge router for smart home | |
Sushma et al. | A review of the cluster based mobile adhoc network intrusion detection system | |
Gupta et al. | Zero aliasing compression | |
Doan et al. | Threat modeling for ML-based topology prediction in vehicular edge computing architecture | |
Jadidoleslamy | Weaknesses, Vulnerabilities and Elusion Strategies Against Intrusion Detection Systems | |
Yang et al. | Intrusion detection solution to WLANs | |
Metwally et al. | Detecting semantic social engineering attack in the context of information security | |
Rahman | WiFi Miner: An online apriori and sensor based wireless network Intrusion Detection System | |
Ezeife et al. | WIDS: A sensor-based online mining wireless intrusion detection system | |
Helling | Home network security | |
ABDULLAH | WIRELESS LOCAL AREA NETWORK: A COMPREHENSIVE REVIEW OF ATTACKS AND METRICS | |
Diab et al. | Security of IoT devices: DoS attacks: Security Threats on IoT layers | |
Belej et al. | Detection of Attacks in Wireless Networks of IoT. | |
ALSHEHRI et al. | THE COUNTERMEASURES OF WIRELESS SENSOR NETWORK THREATS IN IOT SYSTEM | |
Quinan | Detection and Analysis of Long-Term Threats using Large Dynamic Uncertain Graph Models |