To search, Click below search items.
All Published Papers Search Service
Title
Network Intrusion Data Analysis via Consistency Subset Evaluator with ID3, C4.5 and Best-First Trees
Author
Shih Yin Ooi, Yew Meng Leong, Meng Foh Lim, Hong Kuan Tiew, Ying Han Pang
Vol. 13 No. 2 pp. 7-13
Keywords
Network Intrusion Analysis, Data Mining, Decision Tree, IDS, C45, Best-First Tree, Consistency Subset Evaluator