no code implementations • 10 Dec 2019 • Maen Alzubi, Mohammad Almseidin, Mohd Aaqib Lone, Szilveszter Kovacs
In most fuzzy control applications (applying classical fuzzy reasoning), the reasoning method requires a complete fuzzy rule-base, i. e all the possible observations must be covered by the antecedents of the fuzzy rules, which is not always available.
no code implementations • 18 Apr 2019 • Mohammad Almseidin, Szilveszter Kovacs
The performance of the FRI-IDS example application is compared to other common classification algorithms used for detecting DDOS attacks on the same open source test-bed environment.
Cryptography and Security
no code implementations • 21 Nov 2018 • Mohammad Almseidin, Mouhammd Al-kasassbeh, Szilveszter Kovacs
In this paper, we introduce a novel idea capable of supporting the proper data source while avoiding the issues associated with the binary decision.
Networking and Internet Architecture Cryptography and Security
no code implementations • 26 May 2018 • Ibrahim Obeidat, Nabhan Hamadneh, Mouhammd Al-kasassbeh, Mohammad Almseidin
Network security engineers work to keep services available all the time by handling intruder attacks.
no code implementations • 8 Jan 2018 • Mohammad Almseidin, Maen Alzubi, Szilveszter Kovacs, Mouhammd Al-kasassbeh
The focus was on false negative and false positive performance metrics in order to enhance the detection rate of the intrusion detection system.