[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Rawat et al., 2006 - Google Patents

On the use of singular value decomposition for a fast intrusion detection system

Rawat et al., 2006

View PDF
Document ID
11977239312182530008
Author
Rawat S
Pujari A
Gulati V
Publication year
Publication venue
Electronic Notes in Theoretical Computer Science

External Links

Snippet

Traditionally, the application of data mining in intrusion detection systems (IDS) concentrates on the construction of operational IDSs. The main emphasis is on data mining steps, and other KDD (Knowledge Discovery in Databases) are largely ignored. The present study …
Continue reading at www.sciencedirect.com (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Feng et al. Mining network data for intrusion detection through combining SVMs with ant colony networks
Liao et al. Use of k-nearest neighbor classifier for intrusion detection
Gogoi et al. Anomaly detection analysis of intrusion data using supervised & unsupervised approach.
Mohammed et al. Intrusion detection system based on SVM for WLAN
Rawat et al. On the use of singular value decomposition for a fast intrusion detection system
Subaira et al. Efficient classification mechanism for network intrusion detection system based on data mining techniques: a survey
Ben Salem et al. Masquerade attack detection using a search-behavior modeling approach
Balogun et al. Anomaly intrusion detection using an hybrid of decision tree and K-nearest neighbor
Wu et al. Factor-analysis based anomaly detection and clustering
Guevara et al. Data leakage detection algorithm based on task sequences and probabilities
Moorthy et al. A study of Intrusion Detection using data mining
Markam et al. A general study of associations rule mining in intrusion detection system
Soewu et al. Analysis of Data Mining-Based Approach for Intrusion Detection System
Salek et al. Intrusion detection using neuarl networks trained by differential evaluation algorithm
Shetty et al. Data mining techniques for real time intrusion detection systems
Rawat et al. A fast host-based intrusion detection system using rough set theory
Jayasimhan et al. Anomaly detection using a clustering technique
Mohammad et al. A novel local network intrusion detection system based on support vector machine
Yang et al. Support vector machine for intrusion detection based on LSI feature selection
Shrivastava et al. Cyber attack detection and classification based on machine learning technique using nsl kdd dataset
Terzi et al. An Algorithm for Building User-Role Profiles in a Trust Environment1
Namik et al. Reducing network intrusion detection association rules using Chi-Squared pruning technique
Majeed et al. Propose hmnids hybrid multilevel network intrusion detection system
Ling et al. Windows nt user profiling for masquerader detection
Hadri et al. Combination of OMPCA and LDA for anomaly network detection