From student research to intrusion detection
Abstract
- From student research to intrusion detection
Recommendations
An evaluation of clustering technique over intrusion detection system
ICACCI '12: Proceedings of the International Conference on Advances in Computing, Communications and InformaticsData mining has been popularly recognized as an important way to mine useful information from large volumes of data that are noisy, fuzzy & random. Intrusion detection has become an efficient tool against network attack because they allow network ...
Student and Faculty Perceptions of Undergraduate Research Experiences in Computing
Undergraduate research experiences are promoted and funded for their potential in increasing students’ likelihood of pursuing graduate degrees, increasing their confidence, and expanding their awareness of their discipline and career opportunities. ...
Rule generalisation in intrusion detection systems using SNORT
Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks. An IDS's responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this ...
Comments
Information & Contributors
Information
Published In
Sponsors
- KSU: Kennesaw State University
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Abstract
Conference
- KSU
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0