To search, Click below search items.

 

All Published Papers Search Service

Results for Intrusion analysis; Total 2

Title

Network Intrusion Data Analysis via Consistency Subset Evaluator with ID3, C4.5 and Best-First Trees

Author

Shih Yin Ooi, Yew Meng Leong, Meng Foh Lim, Hong Kuan Tiew, Ying Han Pang

Citation

Vol. 13  No. 2  pp. 7-13

Keywords

Network Intrusion Analysis, Data Mining, Decision Tree, IDS, C45, Best-First Tree, Consistency Subset Evaluator


Title

Identification Security at Unauthorized Use of Information System

Author

Navpreet Kaur and Dhawaleswar Rao,

Citation

Vol. 16  No. 1  pp. 72-76

Keywords

Network Security, Honeypots, Firewall, Intrusion analysis, Attacks.


[1]