Kok Chin Khor
Title
Cited by
Cited by
Year
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
KC Khor, CY Ting, S Phon-Amnuaisuk
Applied Intelligence 36 (2), 320-329, 2012
712012
From feature selection to building of Bayesian classifiers: A network intrusion detection perspective
KC Khor, CY Ting, SP Amnuaisuk
American Journal of applied sciences 6 (11), 1948, 2009
412009
A feature selection approach for network intrusion detection
KC Khor, CY Ting, SP Amnuaisuk
2009 international conference on information management and engineering, 133-137, 2009
222009
The effectiveness of sampling methods for the imbalanced network intrusion detection data set
KC Khor, CY Ting, S Phon-Amnuaisuk
Recent Advances on Soft Computing and Data Mining, 613-622, 2014
112014
Comparing single and multiple Bayesian classifiers approaches for network intrusion detection
KC Khor, CY Ting, S Phon-Amnuaisuk
2010 Second International Conference on Computer Engineering and …, 2010
92010
A probabilistic approach for network intrusion detection
KC Khor, CY Ting, SP Amnuaisuk
2008 Second Asia International Conference on Modelling & Simulation (AMS …, 2008
92008
Forming an optimal feature set for classifying network intrusions involving multiple feature selection methods
KC Khor, CY Ting, SP Amnuaisuk
2010 International Conference on Information Retrieval & Knowledge …, 2010
82010
StockProF: a stock profiling framework using data mining approaches
KH Ng, KC Khor
Information Systems and e-Business Management 15 (1), 139-158, 2017
72017
A bayesian approach to classify conference papers
KC Khor, CY Ting
Mexican International Conference on Artificial Intelligence, 1027-1036, 2006
72006
A multiple classifiers system for anomaly detection in credit card data with unbalanced and overlapped classes
SN Kalid, KH Ng, GK Tong, KC Khor
IEEE Access 8, 28210-28221, 2020
42020
Features and Bayesian Network Model of Conceptual Change for INQPRO
CY Ting, KC Khor, S Phon-Amnuaisuk
2010 Second International Conference on Computer Engineering and …, 2010
32010
Evaluation of cost sensitive learning for imbalanced bank direct marketing data
K Kok-Chin, N Keng-Hoong
Indian Journal of Science and Technology 9, 42, 2016
22016
Roles of affect in conceptual change modeling
CY Ting, YC Sam, KC Khor, CC Ho
2014 Sixth International Conference on Intelligent Human-Machine Systems and …, 2014
22014
Virtual musical instruments: air drums
S Phon-Amnuaisuk, K Rezahanjani, HR Momeni, KC Khor
Proceedings of the Sixth International Conference on Information Technology …, 2009
22009
Efficient Information Visualization for Intrusion Detection in Web Applications
KC Khor, SK Lieong, E Ch’ng, UK Birmingham
Computer Graphics, Imaging and Visualization (CGIV'05), International …, 2005
22005
Dimensionality Reduction for Predicting Student Performance in Unbalanced Data Sets
TW Lim, KC Khor, KH Ng
Int. J. Advance Soft Compu. Appl 11 (2), 2019
12019
Rapid identification of outstanding real estate investment trusts with outlier detection algorithms
KH Ng, KC Khor
Journal of Theoretical and Applied Information Technology 88 (2), 321-330, 2016
12016
Evaluation on rapid profiling with clustering algorithms for plantation stocks on Bursa Malaysia
KH Ng
Journal of Information and Communication Technology 15 (2), 63-84, 2016
12016
Effective Classification for Unbalanced Bank Direct Marketing Data with Over-sampling
SN Kalid, KC Khor, KH Ng, CY Ting
Proceedings of Knowledge Management International Conference (KMICE), 16-21, 2014
12014
Rapid Profiling of Plantation Stocks in Bursa Malaysia with Expectation Maximization Clustering
KH Ng, KC Khor, HP Tan
Proceedings of Knowledge Management International Conference (KMICE), 119-124, 2014
12014
The system can't perform the operation now. Try again later.
Articles 1–20