Data Mining for Intrusion Detection

0Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Data Mining Techniques have been successfully applied in many different fields including marketing, manufacturing, fraud detection and network management. Over the past years there is a lot of interest in security technologies such as intrusion detection, cryptography, authentication and firewalls. This paper discusses the application of Data Mining techniques to computer security. Conclusions are drawn and directions for future research are suggested. © 2007 Springer Science+Business Media, LLC.

Cite

CITATION STYLE

APA

Singhal, A. (2007). Data Mining for Intrusion Detection. Advances in Information Security, 31, 59–67. https://doi.org/10.1007/978-0-387-47653-7_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free