Efficient Data Mining Algorithms for Intrusion Detection


COMPUTER COURSE ONLINE

FREE-DOWNLOADS Rawat – 2005
. detect intrusive behavior. 4. On-line Analysis of Network Data: The phenomenon of self-similarity
is exhibited by . we make use of Kendall Tau distance, which is used in rank aggregation . .




IEEE PAPER UNITED STATES