Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 Mewada2010
%A Mewada, Arvind
%D 2010
%J IJACSA - International Journal of Advanced Computer Science and Applications
%K -ids,4,adaptive,based a ability accurate attacks,more but detection discovers do it,msvm,rbf,resulting kernel,fit not not,k-mean,kdd99,lacks of,intrusions on,custom pre-defined presence signature,identify that the to,misuse
%P 30--33
%T Network Anomaly Detection via Clustering and Custom Kernel in MSVM
%U http://ijacsa.thesai.org
%V 1
@article{Mewada2010,
added-at = {2011-06-18T20:19:46.000+0200},
author = {Mewada, Arvind},
biburl = {https://www.bibsonomy.org/bibtex/2040dab26ab23ef2a6a001872f084fcc8/editorijacsa},
file = {:F$\backslash$:/IJACSA/Issue 1/Final Papers/Network+Anomaly+Detection+via+Clustering+and+Custom+Kernel+in+MSVM.pdf:pdf},
interhash = {b5030c34b561243687c9def9159a8ea5},
intrahash = {040dab26ab23ef2a6a001872f084fcc8},
journal = {IJACSA - International Journal of Advanced Computer Science and Applications},
keywords = {-ids,4,adaptive,based a ability accurate attacks,more but detection discovers do it,msvm,rbf,resulting kernel,fit not not,k-mean,kdd99,lacks of,intrusions on,custom pre-defined presence signature,identify that the to,misuse},
pages = {30--33},
timestamp = {2011-06-20T09:00:35.000+0200},
title = {{Network Anomaly Detection via Clustering and Custom Kernel in MSVM}},
url = {http://ijacsa.thesai.org},
volume = 1,
year = 2010
}