1 | A Pattern Recognition Approach to Secure Cipher Documents | National Conference on Advanced Computing (Ncac11), , SVS Engineering College,Coimbatore | 80-85 | 2013 | View |
2 | An Active Defense Mechanism for TCP SYN Flooding Attacks | https://doi.org/10.48550/arXiv.1201.2103 | Vol 1 | 2012 | View |
3 | Cluster Based Cost Efficient Intrusion Detection System for MANET | Https://Arxiv.Org/Pdf/1311.1446 | | 2013 | View |
4 | Survey On Link Layer Attacks in Cognitive Radio Networks | International Journal Of Computer Science, Engineering And Information Technology (IJCSEIT) | Vol.3,No. 6,13-sep | 2013 | View |
5 | Neuro-Fuzzy-Based Clustering of DDoS Attack Detection in the Network | Int. J. Critical Infrastructures | Vol. 13, No. 1,46-56 | 2017 | View |
6 | Review on Classification Based on Artificial Neural Networks | International Journal Of Ambient Systems And Applications (IJASA) | Vol.2, No.4,18-Nov | 2014 | View |
7 | Distributed Denial Of Service (Ddos) Attacks Detection Mechanism | International Journal Of Computer Science, Engineering And Information Technology (IJCSEIT), | Vol.1, No.5, 39-49 | 2011 | View |
8 | An Efficient Detection Mechanism For Distributed Denial Of Service (DDoS) Attack | International Journal Of Electronics Communication And Computer Engineering | Volume 3, Issue 6, Issn (Online): 2249–071x, Issn (Print): 2278–4209,1492-1496 | 2012 | View |
9 | An New Attractive Mage Technique using L-Diversity | Machine Learning And Applications: An International Journal (MLAIJ) | Vol.3, No.2,41-53 | 2016 | View |
10 | Survey Of Network Anomaly Detection Using Markov Chain | International Journal Of Computer Science, Engineering And Information Technology (IJCSEIT) | Vol. 4,No. 1 | 2014 | View |