Rawat et al., 2006 - Google Patents
On the use of singular value decomposition for a fast intrusion detection systemRawat et al., 2006
View PDF- Document ID
- 11977239312182530008
- Author
- Rawat S
- Pujari A
- Gulati V
- Publication year
- Publication venue
- Electronic Notes in Theoretical Computer Science
External Links
Snippet
Traditionally, the application of data mining in intrusion detection systems (IDS) concentrates on the construction of operational IDSs. The main emphasis is on data mining steps, and other KDD (Knowledge Discovery in Databases) are largely ignored. The present study …
- 238000001514 detection method 0 title abstract description 34
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Feng et al. | Mining network data for intrusion detection through combining SVMs with ant colony networks | |
Liao et al. | Use of k-nearest neighbor classifier for intrusion detection | |
Gogoi et al. | Anomaly detection analysis of intrusion data using supervised & unsupervised approach. | |
Mohammed et al. | Intrusion detection system based on SVM for WLAN | |
Rawat et al. | On the use of singular value decomposition for a fast intrusion detection system | |
Subaira et al. | Efficient classification mechanism for network intrusion detection system based on data mining techniques: a survey | |
Ben Salem et al. | Masquerade attack detection using a search-behavior modeling approach | |
Balogun et al. | Anomaly intrusion detection using an hybrid of decision tree and K-nearest neighbor | |
Wu et al. | Factor-analysis based anomaly detection and clustering | |
Guevara et al. | Data leakage detection algorithm based on task sequences and probabilities | |
Moorthy et al. | A study of Intrusion Detection using data mining | |
Markam et al. | A general study of associations rule mining in intrusion detection system | |
Soewu et al. | Analysis of Data Mining-Based Approach for Intrusion Detection System | |
Salek et al. | Intrusion detection using neuarl networks trained by differential evaluation algorithm | |
Shetty et al. | Data mining techniques for real time intrusion detection systems | |
Rawat et al. | A fast host-based intrusion detection system using rough set theory | |
Jayasimhan et al. | Anomaly detection using a clustering technique | |
Mohammad et al. | A novel local network intrusion detection system based on support vector machine | |
Yang et al. | Support vector machine for intrusion detection based on LSI feature selection | |
Shrivastava et al. | Cyber attack detection and classification based on machine learning technique using nsl kdd dataset | |
Terzi et al. | An Algorithm for Building User-Role Profiles in a Trust Environment1 | |
Namik et al. | Reducing network intrusion detection association rules using Chi-Squared pruning technique | |
Majeed et al. | Propose hmnids hybrid multilevel network intrusion detection system | |
Ling et al. | Windows nt user profiling for masquerader detection | |
Hadri et al. | Combination of OMPCA and LDA for anomaly network detection |