Wall of Fame | Most Viewed CSREASAM-2003 Paper
11 years 2 months ago
KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection
Automated rule induction procedures like machine learning and statistical techniques result in rules that lack generalization and maintainability. Developing rules manually throug...
Maheshkumar Sabhnani, Gürsel Serpen
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source218
2Download preprint from source153
3Download preprint from source151
4Download preprint from source148
5Download preprint from source135
6Download preprint from source124
7Download preprint from source96
8Download preprint from source94
9Download preprint from source94
10Download preprint from source88
11Download preprint from source87
12Download preprint from source81
13Download preprint from source79