A new real-time decision tree algorithm for intrusion detection / Khaled Mohammad Ibraheem Mohammad ; Supervised Nevin Mahmoud Darwish
Material type:
- خوارزم جديد لإنشاء شجرة القرارات في الوقت الحقيقي لكشف التسلل عبر الشبكات [Added title page title]
- Issued also as CD
Item type | Current library | Home library | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.13.06.M.Sc.2010.Kh.N (Browse shelf(Opens below)) | Not for loan | 01010110054624000 | ||
![]() |
مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.13.06.M.Sc.2010.Kh.N (Browse shelf(Opens below)) | 54624.CD | Not for loan | 01020110054624000 |
Browsing المكتبة المركزبة الجديدة - جامعة القاهرة shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | ||
Cai01.13.06.M.Sc.2010.Im.D Data mining techniques in telecommunication fraud detection / | Cai01.13.06.M.Sc.2010.Is.D Dynamically partitioned hybrid last level cache for chip multi-processors / | Cai01.13.06.M.Sc.2010.Is.D Dynamically partitioned hybrid last level cache for chip multi-processors / | Cai01.13.06.M.Sc.2010.Kh.N A new real-time decision tree algorithm for intrusion detection / | Cai01.13.06.M.Sc.2010.Kh.N A new real-time decision tree algorithm for intrusion detection / | Cai01.13.06.M.Sc.2010.Kh.S The sopport vector machined kernel : Towards a new classification framework / | Cai01.13.06.M.Sc.2010.Kh.S The sopport vector machined kernel : Towards a new classification framework / |
Thesis (M.Sc.) - Cairo University - Faculty of Engineering - Department of Computer Engineering
Minimizing the time needed for taking decisions usually improves system performance. Computer anti viruses for example try to detect viruses automatically. If the virus detection needs complex computations, it may imporove the detection accuracy but system performance will dramatically decrease. In the same way, network intrusion detection requires taking a fast decision to determine whether there is intrusion or not
Issued also as CD
There are no comments on this title.