Follow
Witcha Chimphlee, Vijja Chimphlee, Chimplee
Witcha Chimphlee, Vijja Chimphlee, Chimplee
Data Science & Analytics, Factory of Science and Technology, Suan Dusit University, Thailand
Verified email at dusit.ac.th - Homepage
Title
Cited by
Cited by
Year
Anomaly-based intrusion detection using fuzzy rough clustering
W Chimphlee, AH Abdullah, MNM Sap, S Srinoy, S Chimphlee
2006 International Conference on Hybrid Information Technology 1, 329-334, 2006
1162006
Data preprocessing on web server log files for mining users access patterns
T Pamutha, S Chimphlee, C Kimpan, P Sanguansat
International Journal of Research and Reviews in Wireless Communications …, 2012
462012
Unsupervised clustering methods for identifying rare events in anomaly detection
W Chimphlee, AH Abdullah, MNM Sap, S Chimphlee, S Srinoy
a a 2, 1, 2005
402005
A Rough-Fuzzy Hybrid Algorithm for computer intrusion detection
W Chimphlee, A HananAbdullah, MNM Sap, S Chimphlee, S Srinoy
a a 2, 1, 2007
342007
Integrating genetic algorithms and fuzzy C-means for anomaly detection
W Chimphlee, AH Abdullah, MNM Sap, S Chimphlee, S Srinoy
2005 Annual IEEE India Conference-Indicon, 575-579, 2005
272005
Unsupervised anomaly detection with unlabeled data using clustering
W Chimphlee, AH Abdullah, MNM Sap, S Chimphlee
International conference on information and communication technology, 2005
272005
Classification via k-means clustering and distance-based outlier detection
S Songma, W Chimphlee, K Maichalernnukul, P Sanguansat
2012 tenth international conference on ICT and knowledge engineering, 125-128, 2012
232012
Rough sets clustering and Markov model for web access prediction
S Chimphlee, N Salim, MS Ngadiman, W Chimphlee, S Srinoy
Proceedings of the Postgraduate Annual Research Seminar, 470-475, 2006
162006
Using association rules and markov model for predit next access on web usage mining
S Chimphlee, N Salim, MS Bin Ngadiman, W Chimphlee
Advances in Systems, Computing Sciences and Software Engineering …, 2006
162006
A novel method for unsupervised anomaly detection using unlabelled data
AS bin Haji Ismail, AH Abdullah, K bin Abu Bak, MA bin Ngadi, D Dahlan, ...
2008 International Conference on Computational Sciences and Its Applications …, 2008
152008
User Future Request Prediction Using KFCM in Web Usage Mining
D Kaur, APS Kaur, FS Punjab
International Journal of Advanced Research in Computer and Communication …, 2013
132013
Independent Component Analysis and Rough Fuzzy based Approach to Web Usage Mining.
S Chimphlee, N Salim, MSB Ngadiman, W Chimphlee, S Srinoy
Artificial Intelligence and Applications, 422-427, 2006
122006
Evaluation of models for predicting user’s next request in web usage mining
B Nigam, S Tokekar, S Jain
international Journal on Cybernetics & informatics (UCi) 4, 1-13, 2015
112015
Hybrid Web Page Prediction Model for Predicting User's Next Access
S Chimphlee
Universiti Teknologi Malaysia, 2011
102011
Network anomaly detection using soft computing
S Srinoy, W Kurutach, W Chimphlee, S Chimphlee
World Acad Sci Eng Technol 9, 140-144, 2005
102005
To Identify Suspicious Activity in Anomaly Detection based on Soft Computing.
W Chimphlee, Mohd. Noor Md. Sap, AH Abdullah, S Chimphlee, S Srinoy
Artificial Intelligence and Applications, 359-364, 2006
92006
Improving web page prediction using default rule selection
T Pamutha, C Kimpan, S Chimplee, P Sanguansat
International Journal of Advanced Computer Science and Applications (IJACSA …, 2012
72012
Improving web page prediction using default rule selection
T Pamutha, C Kimpan, S Chimplee, P Sanguansat
International Journal of Advanced Computer Science and Applications (IJACSA …, 2012
72012
Intrusion detection technique by using fuzzy ART on computer network security
P Somwang, W Lilakiatsakun
2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA …, 2012
62012
To detect misuse and anomaly attacks through rule induction analysis and fuzzy methods.
W Chimphlee, AH Abdullah, MNM Sap, S Chimphlee, S Srinoy
WSEAS Transactions on Computers 5 (1), 49-54, 2006
62006
The system can't perform the operation now. Try again later.
Articles 1–20