Follow
Kok-Chin Khor
Title
Cited by
Cited by
Year
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
KC Khor, CY Ting, S Phon-Amnuaisuk
Applied Intelligence 36, 320-329, 2012
942012
A multiple classifiers system for anomaly detection in credit card data with unbalanced and overlapped classes
SN Kalid, KH Ng, GK Tong, KC Khor
IEEE access 8, 28210-28221, 2020
502020
From feature selection to building of bayesian classifiers: A network intrusion detection perspective
KC Khor, CY Ting, SP Amnuaisuk
American Journal of applied sciences 6 (11), 1948, 2009
412009
A feature selection approach for network intrusion detection
KC Khor, CY Ting, SP Amnuaisuk
2009 international conference on information management and engineering, 133-137, 2009
252009
The effectiveness of sampling methods for the imbalanced network intrusion detection data set
KC Khor, CY Ting, S Phon-Amnuaisuk
Recent Advances on Soft Computing and Data Mining: Proceedings of The First …, 2014
182014
A Bayesian approach to classify conference papers
KC Khor, CY Ting
Mexican International Conference on Artificial Intelligence, 1027-1036, 2006
132006
Comparing single and multiple Bayesian classifiers approaches for network intrusion detection
KC Khor, CY Ting, S Phon-Amnuaisuk
2010 Second International Conference on Computer Engineering and …, 2010
122010
StockProF: a stock profiling framework using data mining approaches
KH Ng, KC Khor
Information Systems and e-Business Management 15, 139-158, 2017
112017
Price prediction using time-series algorithms for stocks listed on bursa malaysia
YT Choy, MH Hoo, KC Khor
2021 2nd International Conference on Artificial Intelligence and Data …, 2021
102021
Dimensionality reduction for predicting student performance in unbalanced data sets
TW Lim, KC Khor, KH Ng
Int. J. Advance Soft Compu. Appl 11 (2), 76-87, 2019
102019
Forming an optimal feature set for classifying network intrusions involving multiple feature selection methods
KC Khor, CY Ting, SP Amnuaisuk
2010 International Conference on Information Retrieval & Knowledge …, 2010
102010
The effect of sampling methods on the CICIDS2017 network intrusion data set
YB Ho, WS Yap, KC Khor
IT Convergence and Security: Proceedings of ICITCS 2021, 33-41, 2021
92021
A probabilistic approach for network intrusion detection
KC Khor, CY Ting, SP Amnuaisuk
2008 Second Asia International Conference on Modelling & Simulation (AMS …, 2008
92008
Autoencoders with Reconstruction Error and Dimensionality Reduction for Credit Card Fraud Detection
N Rosley, GK Tong, KH Ng, SN Kalid, KC Khor
International Conference on Computer, Information Technology and Intelligent …, 2022
62022
Virtual musical instruments: air drums
S Phon-Amnuaisuk, K Rezahanjani, HR Momeni, K Khor
Proceedings of the Sixth International Conference on Information Technology …, 2009
62009
Transfer learning on inception ResNet V2 for expiry reminder: a mobile application development
WY Ong, CW Too, KC Khor
Mobile Web and Intelligent Information Systems: 17th International …, 2021
42021
Evaluation of cost sensitive learning for imbalanced bank direct marketing data
K Kok-Chin, N Keng-Hoong
Indian Journal of Science and Technology, 2016
42016
Evaluation on rapid profiling with clustering algorithms for plantation stocks on Bursa Malaysia
KH Ng, KC Khor
Journal of Information and Communication Technology 15 (2), 63-84, 2016
32016
Features and Bayesian Network Model of Conceptual Change for INQPRO
CY Ting, KC Khor, S Phon-Amnuaisuk
2010 Second International Conference on Computer Engineering and …, 2010
32010
Automating Conference Paper Assignment Using Classification Algorithms Incorporated with TF-IDF Vectorisation
SCH Ngan, MJ Lee, KC Khor
2023 IEEE Symposium on Industrial Electronics & Applications (ISIEA), 1-6, 2023
22023
The system can't perform the operation now. Try again later.
Articles 1–20