Cited By
View all- Jaswal KKumar PRawat S(2015)Design and development of a prototype application for intrusion detection using data mining2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions)10.1109/ICRITO.2015.7359266(1-6)Online publication date: Sep-2015
- Ying Liu Sprague A(2004)Outlier detection and evaluation by network flow2004 International Conference on Machine Learning and Applications, 2004. Proceedings.10.1109/ICMLA.2004.1383547(436-442)Online publication date: 2004