2014 International Conference on Computer Communication and Informatics 2014
DOI: 10.1109/iccci.2014.6921740
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of different intrusion detection system: An empirical approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…(7). False Negative Rate (FNR): FNR defined as the ratio of malicious behavior that have been designated as non-intrusive [6], as shown in 19 [48].…”
Section: Evaluated Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…(7). False Negative Rate (FNR): FNR defined as the ratio of malicious behavior that have been designated as non-intrusive [6], as shown in 19 [48].…”
Section: Evaluated Metricsmentioning
confidence: 99%
“…It signifies the (𝑇 𝑃) as displayed in Eq. ( 18) [48]. 𝐷𝑅 for ASCH-IDS, RBC-IDS, TD-IDS, SARSA-IDS and QL-IDS are shown in Fig.…”
Section: Evaluated Metricsmentioning
confidence: 99%
“…Penetration detection systems have different types based on what part of the information they use or what method they use to detect. [2]…”
Section: Introductionmentioning
confidence: 99%