2012
DOI: 10.1007/978-3-642-35455-7_14
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Analysis and Study in Intrusion Detection System Using k-NN Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…To detect the intrusion, a KNN based method was employed by the authors (Wagh, Neelwarna, & Kolhe, 2012), they claimed that the outcome of KNN is more efficient then the earlier existing methods (Wagh, Neelwarna, & Kolhe, 2012). In another work, modified version of SVM that employ the bat algorithm to synchronize the feature selection was proposed by (Chen, Zhichun, Xia, & Liu, 2013).…”
Section: Noteworthy Contribution Related To This Work Has Been Presen...mentioning
confidence: 99%
“…To detect the intrusion, a KNN based method was employed by the authors (Wagh, Neelwarna, & Kolhe, 2012), they claimed that the outcome of KNN is more efficient then the earlier existing methods (Wagh, Neelwarna, & Kolhe, 2012). In another work, modified version of SVM that employ the bat algorithm to synchronize the feature selection was proposed by (Chen, Zhichun, Xia, & Liu, 2013).…”
Section: Noteworthy Contribution Related To This Work Has Been Presen...mentioning
confidence: 99%
“…mixed design and implementation, difficulties in development, exposing internal implementation details, etc.) [Wag12]. Any SOAP-based WS project takes at least 2 years in defining the SOAP WS layer, deploying those services, and standardizing the interfaces.…”
Section: Chapter 1: Introductionmentioning
confidence: 99%