Efficient Data Mining Algorithms for Intrusion Detection



FREE-DOWNLOADS Rawat – 2005
. detect intrusive behavior. 4. On-line Analysis of Network Data: The phenomenon of self-similarity
is exhibited by . we make use of Kendall Tau distance, which is used in rank aggregation . .