An efficient on-line hurst parameter estimator for detecting volume-based network intrusion attacks

Saved in:
Bibliographic Details
Main Author: Idris, Mohd. Yazid
Format: Thesis
Published: 2008
Subjects:
Online Access:http://eprints.utm.my/id/eprint/34672/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.34672
record_format eprints
spelling my.utm.346722013-12-16T08:15:20Z http://eprints.utm.my/id/eprint/34672/ An efficient on-line hurst parameter estimator for detecting volume-based network intrusion attacks Idris, Mohd. Yazid QA75 Electronic computers. Computer science 2008 Thesis NonPeerReviewed Idris, Mohd. Yazid (2008) An efficient on-line hurst parameter estimator for detecting volume-based network intrusion attacks. PhD thesis, Universiti Teknologi Malaysia, Faculty of Computer Science and Information System.
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Idris, Mohd. Yazid
An efficient on-line hurst parameter estimator for detecting volume-based network intrusion attacks
format Thesis
author Idris, Mohd. Yazid
author_facet Idris, Mohd. Yazid
author_sort Idris, Mohd. Yazid
title An efficient on-line hurst parameter estimator for detecting volume-based network intrusion attacks
title_short An efficient on-line hurst parameter estimator for detecting volume-based network intrusion attacks
title_full An efficient on-line hurst parameter estimator for detecting volume-based network intrusion attacks
title_fullStr An efficient on-line hurst parameter estimator for detecting volume-based network intrusion attacks
title_full_unstemmed An efficient on-line hurst parameter estimator for detecting volume-based network intrusion attacks
title_sort efficient on-line hurst parameter estimator for detecting volume-based network intrusion attacks
publishDate 2008
url http://eprints.utm.my/id/eprint/34672/
_version_ 1643649641635381248
score 13.19449