Index of /ai/To-dom/My_research/Paper-0-again/For-research/D-mining/Anomaly-D/Intrusion-detection/
../
Test-data/ 01-May-2020 21:56 -
033.pdf 01-May-2020 21:56 93184
04.GIF 01-May-2020 21:56 411
040.pdf 01-May-2020 21:56 371712
20acm.pdf 01-May-2020 21:56 161792
BIBLIO~1.HTM~ 01-May-2020 21:56 1216
Data Mining Approaches for Intrusion Detection.htm 01-May-2020 21:56 318
Intrusion-Detection-Intro.pdf 01-May-2020 21:56 52207
Intrusion-detection-by-nn.txt 01-May-2020 21:56 7335
Proceedings of the 1st Workshop on Intrusion De..> 01-May-2020 21:56 355
Real Time Data Mining-based Intrusion Detection..> 01-May-2020 21:56 299
WS_FTP.LOG 01-May-2020 21:56 16591
axelsson98.pdf 01-May-2020 21:56 900096
bibliography.htm 01-May-2020 21:56 2598
brugger-dmnid.pdf 01-May-2020 21:56 335872
dass-mayukh.pdf 01-May-2020 21:56 616448
data-mining-approach.txt 01-May-2020 21:56 58775
deb-dac-wes.pdf 01-May-2020 21:56 708608
discex01.pdf 01-May-2020 21:56 139264
endler98.pdf 01-May-2020 21:56 223232
eskin-etal-i-d-systems.pdf 01-May-2020 21:56 73728
hussam-mousa.pdf 01-May-2020 21:56 215040
id-techniques.pdf 01-May-2020 21:56 515072
ids-20chapter.pdf 01-May-2020 21:56 179200
ids-chapter.pdf 01-May-2020 21:56 179200
idss.pdf 01-May-2020 21:56 534528
ieee0ids.pdf 01-May-2020 21:56 173056
jones-silken.pdf 01-May-2020 21:56 282624
lee98data.pdf 01-May-2020 21:56 140288
mimta03.pdf 01-May-2020 21:56 110592
ncsc.94.pdf 01-May-2020 21:56 160669
probabilistic.pdf 01-May-2020 21:56 261120
proc-of-1st-workshop-on-id.txt 01-May-2020 21:56 47809
realtime-data-mining-based-id.txt 01-May-2020 21:56 56211
soltani.pdf 01-May-2020 21:56 61440
survey.pdf 01-May-2020 21:56 693095
t2a2.pdf 01-May-2020 21:56 153600
taxonomy.pdf 01-May-2020 21:56 110097
tech-report2002.pdf 01-May-2020 21:56 619520