Skip to main content
    • by 
    • by 
    • by 
    • by 
    •   7  
      Machine LearningNetwork SecuritySupport Vector MachinesSvm
    • by 
    •   9  
      Information SecurityMachine LearningData MiningNetwork Security
    • by 
    •   3  
      Operating SystemsReal-time SystemsReal Time Embedded Systems
    • by 
    •   3  
      Network SecuritySupport Vector MachinesIntrusion Detection
Newer intrusions are coming out every day with the all-way growth of the Internet. In this context, this book proposes a hybrid approach of intrusion detection along with architecture. The proposed architecture is flexible enough to carry... more
    • by 
    •   2  
      Data MiningIntrusion Detection
With the rapid and wide-spread growth of internet technology, security risks and threats are also increasing day by day. Newer versions of attacks and intrusions are evolving continuously by putting extra challenges to the field of... more
    • by 
    •   2  
      Information SecurityData Mining
In recent times among the multitude of attacks present in network system, DDoS attacks have emerged to be the attacks with the most devastating effects. The main objective of this paper is to propose a system that effectively detects DDoS... more
    • by  and +1
    •   2  
      Clustering and Classification MethodsIntrusion Detection
This study aimed to investigate ICT competency of mathematics teachers at secondary schools of Nepal. A cross-sectional survey design was deployed among 336 secondary school teachers of Nepal. The data was analyzed by Mann Whitney U,... more
    • by  and +1
    • ICT, Education and Mathematics Teacher
Intrusion detection is the investigation process of information about the system activities or its data to detect any malicious behavior or unauthorized activity. Most of the IDS implements K-means clustering technique due to its linear... more
    • by 
    • Computer Science
    • by 
    •   4  
      BusinessComputer ScienceNetwork SecurityarXiv
    • by 
    • by 
    • Computer Science
Newer intrusions are coming out every day with the all-way growth of the Internet. In this context, this book proposes a hybrid approach of intrusion detection along with architecture. The proposed architecture is flexible enough to carry... more
    • by 
    • Computer Science
With rapid and multi-dimensional growth of data, Relational Database Management System (RDBMS) having Structured Query Language (SQL) support is facing difficulties in managing huge data due to lack of dynamic data model, performance and... more
    • by 
    • Computer Science
This study aimed to investigate ICT competency of mathematics teachers at secondary schools of Nepal. A cross-sectional survey design was deployed among 336 secondary school teachers of Nepal. The data was analyzed by Mann Whitney U,... more
    • by 
In the era of Internet of Things and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis and storage of such humongous volume of data, several new challenges are faced in protecting... more
    • by 
    •   4  
      BusinessComputer ScienceNetwork SecurityarXiv
    • by 
    •   4  
      Information SecurityClustering and Classification MethodsIntrusion DetectionScientific publishing