Ensemble methods in intrusion detection

As services are being deployed on the internet, there is the need to secure the infrastructure from malicious attacks. Intrusion detection serves as a second line of defense apart from firewall and cryptography. There are many techniques employed in intrusion detection which include signature detect...

Full description

Saved in:
Bibliographic Details
Main Author: Josiah, Kekere Temitope
Format: Thesis
Language:English
Published: 2015
Subjects:
Online Access:http://eprints.utm.my/id/eprint/53615/25/KekereTemitopeJosiahMFC2015.pdf
http://eprints.utm.my/id/eprint/53615/
http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:84295
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first