Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/136559
Full metadata record
DC FieldValueLanguage
dc.contributor.authorYap, Brian Jay Padillaen_US
dc.date.accessioned2019-12-30T01:45:16Z-
dc.date.available2019-12-30T01:45:16Z-
dc.date.issued2019-
dc.identifier.urihttps://hdl.handle.net/10356/136559-
dc.description.abstractSince 9/11, the society had been working on various means to suppress ill-intentioned individuals from destroying the nation’s physical infrastructures. As technology increasingly leans towards the cyberspace, ill-intentions have moved from the destruction of physical infrastructures to the sabotage of the cyberspace which these infrastructures rely upon. Hence, given the scarcity of resources, it is the upmost priority of professionals to fully maximise the available security assets. In this report, the author details a purposed system (Anōmalos IDS) where a modern artificial intelligence technique is used with Expert System technique for a ruled-based Anomaly detection.en_US
dc.language.isoenen_US
dc.publisherNanyang Technological Universityen_US
dc.subjectEngineering::Electrical and electronic engineeringen_US
dc.titleInvestigation on effective solutions against insider attack (Anōmalos IDS)en_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorMa Maodeen_US
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen_US
dc.description.degreeBachelor of Engineering (Electrical and Electronic Engineering)en_US
dc.contributor.supervisoremailEMDMa@ntu.edu.sgen_US
item.grantfulltextrestricted-
item.fulltextWith Fulltext-
Appears in Collections:EEE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
(A3312-182) FYP Report.pdf
  Restricted Access
5.99 MBAdobe PDFView/Open

Page view(s)

267
Updated on Apr 19, 2025

Download(s) 50

25
Updated on Apr 19, 2025

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.