Anomaly-based intrusion detection using fuzzy rough clustering W Chimphlee, AH Abdullah, MNM Sap, S Srinoy, S Chimphlee 2006 International Conference on Hybrid Information Technology 1, 329-334, 2006 | 118 | 2006 |
Data preprocessing on web server log files for mining users access patterns T Pamutha, S Chimphlee, C Kimpan, P Sanguansat International Journal of Research and Reviews in Wireless Communications …, 2012 | 45 | 2012 |
Unsupervised clustering methods for identifying rare events in anomaly detection W Chimphlee, AH Abdullah, MNM Sap, S Chimphlee, S Srinoy a a 2, 1, 2005 | 40 | 2005 |
A rough-fuzzy hybrid algorithm for computer intrusion detection W Chimphlee, A HananAbdullah, MNM Sap, S Chimphlee, S Srinoy a a 2, 1, 2007 | 35 | 2007 |
Integrating genetic algorithms and fuzzy C-means for anomaly detection W Chimphlee, AH Abdullah, MNM Sap, S Chimphlee, S Srinoy 2005 Annual IEEE India Conference-Indicon, 575-579, 2005 | 27 | 2005 |
Unsupervised anomaly detection with unlabeled data using clustering W Chimphlee, AH Abdullah, MNM Sap, S Chimphlee International conference on information and communication technology, 2005 | 27 | 2005 |
Classification via k-means clustering and distance-based outlier detection S Songma, W Chimphlee, K Maichalernnukul, P Sanguansat 2012 tenth international conference on ICT and knowledge engineering, 125-128, 2012 | 23 | 2012 |
Rough sets clustering and Markov model for web access prediction S Chimphlee, N Salim, MS Ngadiman, W Chimphlee, S Srinoy Proceedings of the Postgraduate Annual Research Seminar, 470-475, 2006 | 17 | 2006 |
Using association rules and markov model for predit next access on web usage mining S Chimphlee, N Salim, MS Bin Ngadiman, W Chimphlee Advances in Systems, Computing Sciences and Software Engineering …, 2006 | 17 | 2006 |
Evaluation of models for predicting user’s next request in web usage mining B Nigam, S Tokekar, S Jain international Journal on Cybernetics & informatics (UCi) 4, 1-13, 2015 | 16 | 2015 |
A novel method for unsupervised anomaly detection using unlabelled data AS bin Haji Ismail, AH Abdullah, K bin Abu Bak, MA bin Ngadi, D Dahlan, ... 2008 International Conference on Computational Sciences and Its Applications …, 2008 | 15 | 2008 |
User Future Request Prediction Using KFCM in Web Usage Mining D Kaur, APS Kaur, FS Punjab International Journal of Advanced Research in Computer and Communication …, 2013 | 13 | 2013 |
Independent Component Analysis and Rough Fuzzy based Approach to Web Usage Mining. S Chimphlee, N Salim, MSB Ngadiman, W Chimphlee, S Srinoy Artificial Intelligence and Applications, 422-427, 2006 | 12 | 2006 |
Machine learning to improve the performance of anomaly-based network intrusion detection in big data S Chimphlee, W Chimphlee Indonesian Journal of Electrical Engineering and Computer Science 30 (2 …, 2023 | 10 | 2023 |
Hybrid Web Page Prediction Model for Predicting User's Next Access S Chimphlee Universiti Teknologi Malaysia, 2011 | 10 | 2011 |
Network anomaly detection using soft computing S Srinoy, W Kurutach, W Chimphlee, S Chimphlee World Acad Sci Eng Technol 9, 140-144, 2005 | 10 | 2005 |
To Identify Suspicious Activity in Anomaly Detection based on Soft Computing. W Chimphlee, Mohd. Noor Md. Sap, AH Abdullah, S Chimphlee, S Srinoy Artificial Intelligence and Applications, 359-364, 2006 | 9 | 2006 |
Improving web page prediction using default rule selection T Pamutha, C Kimpan, S Chimplee, P Sanguansat International Journal of Advanced Computer Science and Applications (IJACSA …, 2012 | 7 | 2012 |
To detect misuse and anomaly attacks through rule induction analysis and fuzzy methods. W Chimphlee, AH Abdullah, MNM Sap, S Chimphlee, S Srinoy WSEAS Transactions on Computers 5 (1), 49-54, 2006 | 7 | 2006 |
Intrusion detection technique by using fuzzy ART on computer network security P Somwang, W Lilakiatsakun 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA …, 2012 | 6 | 2012 |