• Citations Per Year
Learn More
This paper intends to classify the Ljubljana Breast Cancer dataset using C4.5 Decision Tree and Naïve Bayes classifiers. In this work, classification is carriedout using two methods. In the first method, dataset is analysed using all the attributes in the dataset. In the second method, attributes are ranked using information gain ranking(More)
Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. This is due to the extensive growth of internet connectivity and accessibility to information systems worldwide. To deal with this problem, in this paper a hybrid algorithm is proposed to integrate Modified Artificial Bee Colony(More)
In machine learning and statistics, feature selection is the technique of selecting a subset of relevant features for building robust learning models. In this paper we propose a bio-inspired BAT algorithm as feature selection method to find the optimal features from the KDDCup’99 intrusion detection dataset obtained from UCI Machine Learning repository.(More)
Intrusion Detection System is a security support mechanism which has received great attention from researchers all over the globe recently. In the recent past, bio-inspired meta-heuristic technique such as swarm intelligence is being proposed for intrusion detection. Swarm Intelligence approaches are used to solve complicated problems by multiple simple(More)
Background: South Asia has a large proportion of young people in the world and teenage pregnancy has emerged as one of the major public health problem among them. The objective of this study is to systematically review to identify the risk factors associated with teenage pregnancy in South Asian countries. Methods: We systematically searched MEDLINE, EMBASE(More)
With the widespread use of Internet, the possibilities of exposing confidential data to invaders or attackers increases. Intrusion Detection System (IDS) is used for detecting various intrusions in network environment and to prevent data from malicious attackers. In this paper, a combined algorithm based on Principal Component Analysis (PCA) and Core Vector(More)
Intruder is one of the most publicized threats to security. In recent years, intrusion detection has emerged as an important technique for network security. Data mining techniques have been applied as a new approach for intrusion detection. The quality of the feature selection methods is one of the important factors that affect the effectiveness of(More)
  • 1