Threshold Verification Technique for Network Intrusion Detection System

Internet has played a vital role in this modern world, the possibilities and opportunities offered are limitless. Despite all the hype, Internet services are liable to intrusion attack that could tamper the confidentiality and integrity of important information. An attack started with gathering...

Full description

Saved in:
Bibliographic Details
Main Authors: Abdollah, M. F., Mas'ud, M. Z., Sahib, S., Yusof, R., Selamat, S. R.
Format: Article
Language:English
Published: 2009
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/187/1/0906.3843.pdf
http://eprints.utem.edu.my/id/eprint/187/
Tags: Add Tag
No Tags, Be the first to tag this record!