Search Results - "Ibrahim, Laheeb M."

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    A COMPARISON STUDY FOR INTRUSION DATABASE (KDD99, NSL-KDD) BASED ON SELF ORGANIZATION MAP (SOM) ARTIFICIAL NEURAL NETWORK by LAHEEB M. IBRAHIM, DUJAN T. BASHEER, MAHMOD S. MAHMOD

    “…Detecting anomalous traffic on the internet has remained an issue of concern for the community of security researchers over the years. The advances in the area…”
    Get full text
    Journal Article
  2. 2

    Intrusion Detection System Based on Machine Learning Techniques: A Survey by Sheet, Omar I., Ibrahim, Laheeb M.

    “…The volume of network traffic data has become so big and complicated as a result of the development in Internet-based services that it is extremely difficult…”
    Get full text
    Conference Proceeding
  3. 3

    Software effort estimation Based on long short term memory and stacked long short term memory by Ahmad, Farah B., Ibrahim, Laheeb M.

    “…Software effort estimation (SEE) is an important process for predicting the effort required to develop or maintain software projects. It is considered one of…”
    Get full text
    Conference Proceeding
  4. 4

    Software Development Effort Estimation Techniques Using Long Short Term Memory by Ahmad, Farah B., Ibrahim, Laheeb M.

    “…The Software Effort Estimation (SEE) process is used to predict the effort involved in developing a software project inaccuracy. This process permeates the…”
    Get full text
    Conference Proceeding
  5. 5

    Design and Implement Machine Learning Tool for Cyber Security Risk Assessment by Omar I. Sheet, Laheeb M. Ibrahim

    “…Cyber-attacks have increased in number and severity, which has negatively affected businesses and their services. As such, cyber security is no longer…”
    Get full text
    Journal Article