Year | DOI | Venue |
---|---|---|
2004 | 10.1108/09685220410563397 | Inf. Manag. Comput. Security |
Keywords | Field | DocType |
data security,algorithm,information protection,intrusion detection system,computer security,ordering,frequency,measurement,intrusion detection,detector,k nearest neighbor,similarity,similitude,false positive,system monitoring | k-nearest neighbors algorithm,Similitude,Data mining,Similarity measure,Computer science,Computer security,Kendall tau distance,Anomaly-based intrusion detection system,Classifier (linguistics),Intrusion detection system,False positive paradox | Journal |
Volume | Issue | Citations |
12 | 5 | 4 |
PageRank | References | Authors |
0.42 | 7 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Sanjay Rawat | 1 | 146 | 10.59 |
Ved Prakash Gulati | 2 | 51 | 7.18 |
Arun K. Pujari | 3 | 420 | 48.20 |