Enhanced features ranking and selection using recursive feature elimination (RFE) and k-nearest neighbor algorithms in support vector machine for intrusion detection system KT Khaing International Journal of Network and Mobile Technologies 1 (1), 1832-6758, 2010 | 35 | 2010 |
Detection model for daniel-of-service attacks using random forest and k-nearest neighbors PT Htun, KT Khaing International Journal of Advanced Research in Computer Engineering …, 2013 | 23 | 2013 |
Anomaly intrusion detection system using random forests and k-nearest neighbor PT Htun, KT Khaing Probe 41102 (4107), 2377, 2013 | 10 | 2013 |
Important roles of data mining techniques for anomaly intrusion detection system PT Htun, KT Khaing International Journal of Advanced Research in Computer Engineering …, 2013 | 6 | 2013 |
Detection and Classification of Attacks in Unauthorized Accesses MTM Win, KT Khaing International Conference on Advances in Engineering and Technology (ICAET …, 2014 | 4 | 2014 |
Analyzing knowledge based feature selection to detect remote to local attacks MTM Win, KT Khaing Int J Adv Res Comput Eng Technol 2 (5), 1762-1765, 2013 | 2 | 2013 |
Analyzing denial-of-service attacks in KDD CUP 99 data set for intrusion detection system KT Khaing, T Naing MERAL Portal, 2009 | 1 | 2009 |
Android Malware Detection and Characterization Based-on Network Traffic Flow KN Tun, ZM Aye, KT Khaing Scientific Journal of Innovative Research 2019 1 (1), 2019 | | 2019 |
Performance Analysis of Different Feature Selection Methods for DoS Attacks in Intrusion Detection System MYATMYO WIN, KT KHAING, CSU HTWE Journal of Electronic Engineering Research and Development (JEERD) 1 (1), 2019 | | 2019 |
Analysis on Malware Detection with Multi Classifiers on M0Droid and DroidScreening Datasets KN Tun, ZM Aye, KT Khaing MERAL Portal, 2019 | | 2019 |
Performance Evaluation of Different Classifiers for Detection of Attacks in Unauthorized Accesses MYATMYO WIN, KT KHAING Int. J. Sci. Eng. Technol. Res 3, 2890-2894, 2014 | | 2014 |
Analyzing Rules to Detect Attacks in Unauthorized Accesses MTM Win, PT Htun, KT Khaing MERAL Portal, 2012 | | 2012 |
Detecting Features of Intrusion Detection System using Support Vector Machine (SVM) Kyaw Thet Khaing,Thinn Thu Naing Proceeding of the 8th International Conference on Computer Application …, 2010 | | 2010 |
Enhanced features ranking and selection using recursive feature elimination (RFE) and K-Nearest Neighbor algorithms KT Khaing International Journal of Network and Mobile Technologies 1 (1), 1-12, 2010 | | 2010 |
Enhanced Support Vector Machine Model with Recursive Features Elimination Algorithm for Anomaly Intrusion Detection System KT Khaing Ph.D(IT), 2010 | | 2010 |
Analyzing Machine Learning Algorithms to Detect Novel attacks in Network Intrusion Detection System PT Htun, MTM Win, KT Khaing MERAL Portal, 0 | | |
Design Test-bed for Driving System Automation KT Khaing, KT Khine MERAL Portal, 0 | | |
Ranking and Filtering the Selected Attributes for Intrusion Detection System PT Htun, KT Khaing | | |