[HTML][HTML] Risk-Based System-Call Sequence Grouping Method for Malware Intrusion Detection
Malware intrusion is a serious threat to cybersecurity; that is why new and innovative
methods are constantly being developed to detect and prevent it. This research focuses on …
methods are constantly being developed to detect and prevent it. This research focuses on …
[PDF][PDF] Review Paper on Data Mining and its Techniques of Mahatma Gandhi National Rural Employment Guarantee Act
K Yadav, M Parmar - International Journal of Computer Science …, 2017 - researchgate.net
Data Mining is a technique that attempts to find useful pattern from substantial volume of
data. The paper reviews data mining and its techniques in e-governance. The paper also …
data. The paper reviews data mining and its techniques in e-governance. The paper also …
[PDF][PDF] An improved knn classifier for anomaly intrusion detection system using cluster optimization
OP Akomolafe, AI Adegboyega - An Improved KNN Classifier for Anomaly …, 2017 - ijcst.org
With the emergence of anomaly intrusion detection system, varieties of unknown intrusions
that were not detected by the misuse or signature based intrusion detection system can now …
that were not detected by the misuse or signature based intrusion detection system can now …
[PDF][PDF] Denial of service intrusion detection system (IDS) based on Naïve Bayes classifier using NSL KDD and KDD cup 99 datasets
S Hashem, H Adil - Journal of Al-Rafidain University College For Sciences …, 2017 - iasj.net
Intrusion Detection Systems (IDS) become necessary to protect data from intruders and
reduce the damage of the information system and networks especially in cloud environment …
reduce the damage of the information system and networks especially in cloud environment …
[PDF][PDF] Analysis of Mahatma Gandhi National Rural Employment Guarantee Act Using Data Mining
K Yadav, M Parmar - International Journal of Computational …, 2017 - researchgate.net
Abstract Mahatma Gandhi National Rural Employment Guarantee Act (MGNREGA) aims at
livelihood security of people in rural areas by guaranteeing hundred days of wage …
livelihood security of people in rural areas by guaranteeing hundred days of wage …
[PDF][PDF] An improved intrusion system design using hybrid classification technique
R Mandal, S Yadav - International Journal of Computer Applications, 2015 - Citeseer
The data mining is an essential tool for current age technology. It is very useful for various
applications such as business intelligence, computational cloud and other research and …
applications such as business intelligence, computational cloud and other research and …
Optimal Weighted Average Prediction and Correction in Big Sensor Data Using Fruit Fly Algorithm and Support Vector Machine
Some techniques have been developed in recent years for processing sensor data on cloud,
such as sensor-cloud. However, these techniques do not provide efficient support on fast …
such as sensor-cloud. However, these techniques do not provide efficient support on fast …