Cloud computing architectures based IDS

EN Saad, K El Mahdi, M Zbakh - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
Today, cloud computing is an attractive and cost-saving service for buyers as it provides
accessibility and reliability options for users and scalable sales for providers. Before …

[PDF][PDF] An Integrated Approach for Intrusion Detection using Computational Methods

BB Sujitha, V Kavitha - Indian Journal …, 2015 - sciresol.s3.us-east-2.amazonaws …
Today's network world is facing lot of challenging task; Intrusion Detection is the method
adopted to identify the unauthorised activities in the network. The type of malicious activities …

[PDF][PDF] Data mining framework for computer Network security Management

NS Chandolikar - 2015 - 210.212.169.38
Computer network security is becoming most essential because of tremendous growth of
Internet. Interconnected world causes more opportunities for attacker to attack remote …

[ZITATION][C] Determining feature set of DOS attacks

P Bhoria, K Garg - International Journal of Advanced Research in …, 2013

[ZITATION][C] An Imperial learning of Data Mining Classification Algorithms in Intrusion Detection Dataset

MP Bhoria, K Garg - International Journal of Scientific & Engineering …, 2013