A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection KC Khor, CY Ting, S Phon-Amnuaisuk Applied Intelligence 36, 320-329, 2012 | 94 | 2012 |
A multiple classifiers system for anomaly detection in credit card data with unbalanced and overlapped classes SN Kalid, KH Ng, GK Tong, KC Khor IEEE access 8, 28210-28221, 2020 | 52 | 2020 |
From feature selection to building of bayesian classifiers: A network intrusion detection perspective KC Khor, CY Ting, SP Amnuaisuk American Journal of applied sciences 6 (11), 1948, 2009 | 41 | 2009 |
A feature selection approach for network intrusion detection KC Khor, CY Ting, SP Amnuaisuk 2009 international conference on information management and engineering, 133-137, 2009 | 25 | 2009 |
The effectiveness of sampling methods for the imbalanced network intrusion detection data set KC Khor, CY Ting, S Phon-Amnuaisuk Recent Advances on Soft Computing and Data Mining: Proceedings of The First …, 2014 | 18 | 2014 |
A Bayesian approach to classify conference papers KC Khor, CY Ting Mexican International Conference on Artificial Intelligence, 1027-1036, 2006 | 13 | 2006 |
Comparing single and multiple Bayesian classifiers approaches for network intrusion detection KC Khor, CY Ting, S Phon-Amnuaisuk 2010 Second International Conference on Computer Engineering and …, 2010 | 12 | 2010 |
StockProF: a stock profiling framework using data mining approaches KH Ng, KC Khor Information Systems and e-Business Management 15, 139-158, 2017 | 11 | 2017 |
Price prediction using time-series algorithms for stocks listed on bursa malaysia YT Choy, MH Hoo, KC Khor 2021 2nd International Conference on Artificial Intelligence and Data …, 2021 | 10 | 2021 |
Dimensionality reduction for predicting student performance in unbalanced data sets TW Lim, KC Khor, KH Ng Int. J. Advance Soft Compu. Appl 11 (2), 76-87, 2019 | 10 | 2019 |
Forming an optimal feature set for classifying network intrusions involving multiple feature selection methods KC Khor, CY Ting, SP Amnuaisuk 2010 International Conference on Information Retrieval & Knowledge …, 2010 | 10 | 2010 |
The effect of sampling methods on the CICIDS2017 network intrusion data set YB Ho, WS Yap, KC Khor IT Convergence and Security: Proceedings of ICITCS 2021, 33-41, 2021 | 9 | 2021 |
A probabilistic approach for network intrusion detection KC Khor, CY Ting, SP Amnuaisuk 2008 Second Asia International Conference on Modelling & Simulation (AMS …, 2008 | 9 | 2008 |
Autoencoders with Reconstruction Error and Dimensionality Reduction for Credit Card Fraud Detection N Rosley, GK Tong, KH Ng, SN Kalid, KC Khor International Conference on Computer, Information Technology and Intelligent …, 2022 | 6 | 2022 |
Virtual musical instruments: air drums S Phon-Amnuaisuk, K Rezahanjani, HR Momeni, K Khor Proceedings of the Sixth International Conference on Information Technology …, 2009 | 6 | 2009 |
Transfer learning on inception ResNet V2 for expiry reminder: a mobile application development WY Ong, CW Too, KC Khor Mobile Web and Intelligent Information Systems: 17th International …, 2021 | 4 | 2021 |
Evaluation of cost sensitive learning for imbalanced bank direct marketing data K Kok-Chin, N Keng-Hoong Indian Journal of Science and Technology, 2016 | 4 | 2016 |
Evaluation on rapid profiling with clustering algorithms for plantation stocks on Bursa Malaysia KH Ng, KC Khor Journal of Information and Communication Technology 15 (2), 63-84, 2016 | 3 | 2016 |
Features and Bayesian Network Model of Conceptual Change for INQPRO CY Ting, KC Khor, S Phon-Amnuaisuk 2010 Second International Conference on Computer Engineering and …, 2010 | 3 | 2010 |
Automating Conference Paper Assignment Using Classification Algorithms Incorporated with TF-IDF Vectorisation SCH Ngan, MJ Lee, KC Khor 2023 IEEE Symposium on Industrial Electronics & Applications (ISIEA), 1-6, 2023 | 2 | 2023 |