Feature Selection for Detecting Fast Attack in Network Intrusion Detection
Over the last decade, networks have grown in both size and importance especially in exchange data and carry out transactions. They have also become the main mean to attack host. The popularity of intrusion tools and attack scripts are the main contributors of the attacks inside the network.These inf...
à®®à¯à®´à¯ விளகà¯à®•à®®à¯
Saved in:
| தலைமை எழà¯à®¤à¯à®¤à®¾à®³à®°à¯à®•ளà¯: | , , , , |
|---|---|
| வடிவமà¯: | கடà¯à®Ÿà¯à®°à¯ˆ |
| வெளியீடபà¯à®ªà®Ÿà¯à®Ÿà®¤à¯: |
Universiti Teknikal Malaysia Melaka
2008
|
| பகà¯à®¤à®¿à®•ளà¯: | |
| நிகழà¯à®¨à®¿à®²à¯ˆ அணà¯à®•லà¯: | http://eprints.utem.edu.my/186/ http://eprints.utem.edu.my/186/1/02_02_4%5B1%5D-JAMT_vol_2_no_2.pdf |
| கà¯à®±à®¿à®¯à¯€à®Ÿà¯à®•ளà¯: |
கà¯à®±à®¿à®šà¯à®šà¯Šà®²à¯ இணை
கà¯à®±à®¿à®¯à¯€à®Ÿà¯à®•ள௠இலà¯à®²à¯ˆ, இநà¯à®¤ கà¯à®±à®¿à®šà¯à®šà¯Šà®²à¯à®²à¯ˆ à®®à¯à®¤à®²à®¿à®²à¯ பதிவ௠செயà¯à®¯à¯à®™à¯à®•ளà¯!
|