Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/39128
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | Computer Science and Engineering | en_US |
dc.date.accessioned | 2015-04-17T07:40:48Z | - |
dc.date.available | 2015-04-17T07:40:48Z | - |
dc.date.issued | 2015-04-17 | - |
dc.identifier.uri | http://hdl.handle.net/10603/39128 | - |
dc.description.abstract | Abstract Available | en_US |
dc.format.extent | 323p. | en_US |
dc.language | English | en_US |
dc.relation | - | en_US |
dc.rights | university | en_US |
dc.title | Applying data mining techniques in anomaly based network intrusion detection | en_US |
dc.title.alternative | - | en_US |
dc.creator.researcher | Bhuyan, Monowar Hussain | en_US |
dc.subject.keyword | anomaly based network | en_US |
dc.subject.keyword | data mining techniques | en_US |
dc.subject.keyword | intrusion detection | en_US |
dc.description.note | Bibliography p.277-323 | en_US |
dc.contributor.guide | Bhattacharyya, Dhruba Kumar | en_US |
dc.publisher.place | Tezpur | en_US |
dc.publisher.university | Tezpur University | en_US |
dc.publisher.institution | Department of Computer Science and Engineering | en_US |
dc.date.registered | n.d. | en_US |
dc.date.completed | 2013 | en_US |
dc.date.awarded | n.d. | en_US |
dc.format.dimensions | - | en_US |
dc.format.accompanyingmaterial | None | en_US |
dc.type.degree | Ph.D. | en_US |
dc.source.inflibnet | INFLIBNET | en_US |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: