ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Fusion of multiple data mining techniques for effective network intrusion detection
Proceedings of the Fifth International Conference on Security of Information and Networks - SIN '12
◽
10.1145/2388576.2388603
◽
2012
◽
Author(s):
A. M. Chandrashekar
◽
K. Raghuveer
Keyword(s):
Data Mining
◽
Intrusion Detection
◽
Network Intrusion Detection
◽
Data Mining Techniques
◽
Network Intrusion
◽
Multiple Data
◽
Effective Network
Download Full-text
Related Documents
Cited By
References
Comparison of Data Mining Techniques for Building Network Intrusion Detection Models
International Journal of Computer Applications
◽
10.5120/ijca2016909840
◽
2016
◽
Vol 142
(6)
◽
pp. 31-34
Author(s):
Harsha Kosta
◽
Darshan Bhavesh
Keyword(s):
Data Mining
◽
Intrusion Detection
◽
Network Intrusion Detection
◽
Data Mining Techniques
◽
Network Intrusion
Download Full-text
Data Mining Techniques for Network Intrusion Detection and Prevention Systems
International Journal of Innovative Research in Computer Science & Technology
◽
10.21276/ijircst.2016.4.6.3
◽
2016
◽
pp. 175-180
Author(s):
Nareshkumar D. Harale
◽
Dr.B.B. Meshram
Keyword(s):
Data Mining
◽
Intrusion Detection
◽
Network Intrusion Detection
◽
Data Mining Techniques
◽
Network Intrusion
◽
Intrusion Detection And Prevention
Download Full-text
Intelligent network intrusion detection system using data mining techniques
2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)
◽
10.1109/icatcct.2016.7912017
◽
2016
◽
Cited By ~ 14
Author(s):
Amreen Sultana
◽
M.A. Jabbar
Keyword(s):
Data Mining
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Intelligent Network
◽
Data Mining Techniques
◽
Network Intrusion
◽
Network Intrusion Detection System
◽
Using Data
Download Full-text
Data Mining Techniques for Network Intrusion Detection and Prevention Systems
SSRN Electronic Journal
◽
10.2139/ssrn.3534108
◽
2016
◽
Author(s):
Nareshkumar D. Harale
◽
Dr. B. B. Meshram
Keyword(s):
Data Mining
◽
Intrusion Detection
◽
Network Intrusion Detection
◽
Data Mining Techniques
◽
Network Intrusion
◽
Intrusion Detection And Prevention
Download Full-text
Efficient classification mechanism for network intrusion detection system based on data mining techniques: A survey
2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)
◽
10.1109/isco.2014.7103959
◽
2014
◽
Cited By ~ 5
Author(s):
A. S Subaira
◽
P. Anitha
Keyword(s):
Data Mining
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Data Mining Techniques
◽
Network Intrusion
◽
Network Intrusion Detection System
Download Full-text
Using Data Mining Techniques in Building Dataset for Network Intrusion Detection
International Review on Computers and Software (IRECOS)
◽
10.15866/irecos.v10i7.6121
◽
2015
◽
Vol 10
(7)
◽
pp. 652
Author(s):
Manar Jacob Aljabr
Keyword(s):
Data Mining
◽
Intrusion Detection
◽
Network Intrusion Detection
◽
Data Mining Techniques
◽
Network Intrusion
◽
Using Data
Download Full-text
Empirical Analysis of Data Mining Techniques in Network Intrusion Detection Systems
Communications in Computer and Information Science - Intelligent Technologies and Applications
◽
10.1007/978-3-030-71711-7_22
◽
2021
◽
pp. 269-279
Author(s):
Reza Soufizadeh
◽
Jamshid Bagherzadeh
Keyword(s):
Data Mining
◽
Intrusion Detection
◽
Empirical Analysis
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Data Mining Techniques
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Network intrusion detection system using various data mining techniques
2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS)
◽
10.1109/rains.2016.7764418
◽
2016
◽
Cited By ~ 8
Author(s):
Dikshant Gupta
◽
Suhani Singhal
◽
Shamita Malik
◽
Archana Singh
Keyword(s):
Data Mining
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Data Mining Techniques
◽
Network Intrusion
◽
Network Intrusion Detection System
Download Full-text
An Effective Network Intrusion Detection Using Hellinger Distance-Based Monitoring Mechanism
2018 International Conference on Applied Smart Systems (ICASS)
◽
10.1109/icass.2018.8652008
◽
2018
◽
Cited By ~ 1
Author(s):
Benamar Bouyeddou
◽
Fouzi Harrou
◽
Ying Sun
◽
Benamar Kadri
Keyword(s):
Intrusion Detection
◽
Hellinger Distance
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Monitoring Mechanism
◽
Effective Network
Download Full-text
A Comparative Evolution of Unsupervised Techniques for Effective Network Intrusion Detection in Hadoop
Communications in Computer and Information Science - Advances in Computing and Data Sciences
◽
10.1007/978-981-13-1813-9_28
◽
2018
◽
pp. 279-287
Author(s):
Priyanka Dahiya
◽
Devesh Kumar Srivastava
Keyword(s):
Intrusion Detection
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Effective Network
◽
Comparative Evolution
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close