Using clustering to capture attackers

NP Shetty - 2016 International Conference on Inventive …, 2016 - ieeexplore.ieee.org
As the attackers nowadays are getting craftier it is deemed important to have a security
system which is easy to maintain and economically affordable and gives suitable defense …

[PDF][PDF] Defense against Intrusions using Genetic-K-Means methodology

NP Shetty, D Deepak - researchgate.net
In the current era of Internet securing the digital contents and information system has
become a hot topic of research. In information security, intrusion detection is the act of …

[PDF][PDF] Effective Clustering of Genetically Generated Anamolies

NP Shetty, D Deepak - researchgate.net
The advent of Internet in all domains has given rise to newer attacks and vulnerabilities. The
widespread growth and use of Internet has made security of host and network an important …

[引用][C] THE EFFICIENT PROACTIVE APPROACH FOR NETWORK FORENSICS THROUGH CRYPTOGRAPHIC AND DATA MINING TECHNIQUES

[引用][C] High performance intrusion detection using modified k-mean & Naïve Bayes

A Sakhi, B Mallick - International Journal of Research in Engineering and …

[引用][C] INTRUSION DETECTION SYSTEM BY USING SVM & ANN

M Sharma, S Sharma, B SSCET - 2016