ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
15
views
3
references
Top references
cited by
82
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,761
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Use of K-Nearest Neighbor classifier for intrusion detection
Author(s):
Yihua Liao
,
V.Rao Vemuri
Publication date
Created:
October 2002
Publication date
(Print):
October 2002
Journal:
Computers & Security
Publisher:
Elsevier BV
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Big Data Privacy
Most cited references
3
Record
: found
Abstract
: not found
Article
: not found
Gauging Similarity with n-Grams: Language-Independent Categorization of Text
M. Damashek
(1995)
0
comments
Cited
51
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Expert Network: Effective and Efficient Learning from Human Decisions in Text Categorization and Retrieval
Yiming Yang
(1994)
0
comments
Cited
21
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Probabilistic techniques for intrusion detection based on computer audit data
Qiang Chen
,
Mingming Xu
,
S.M. Emran
…
(2001)
0
comments
Cited
13
times
– based on
0
reviews
Review now
Bookmark
All references
Author and article information
Journal
Title:
Computers & Security
Abbreviated Title:
Computers & Security
Publisher:
Elsevier BV
ISSN (Print):
01674048
Publication date Created:
October 2002
Publication date (Print):
October 2002
Volume
: 21
Issue
: 5
Pages
: 439-448
Article
DOI:
10.1016/S0167-4048(02)00514-X
SO-VID:
070fd0b6-7702-4666-8c05-7e4886a667b6
Copyright ©
© 2002
License:
http://www.elsevier.com/tdm/userlicense/1.0/
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
3,761
Asymptotic theory for the multidimensional random on-line nearest-neighbour graph
Authors:
Andrew R. Wade
Privacy preserving k-nearest neighbor classification
Authors:
Zhan
Absence of Partially Disordered States in the Axial Next Nearest-Neighbor Ising (ANNNI) Model
Authors:
Kazuo Nakanishi
See all similar
Cited by
78
Anomaly-based network intrusion detection: Techniques, systems and challenges
Authors:
P. García-Teodoro
,
J. Díaz-Verdejo
,
G. Maciá-Fernández
…
Intrusion detection by machine learning: A review
Authors:
Chih-Fong Tsai
,
Yu-Feng Hsu
,
CHIA-YING LIN
…
Application of Machine Learning in Microbiology
Authors:
Kaiyang Qu
,
Fei Guo
,
Xiangrong Liu
…
See all cited by
Most referenced authors
20
Y Yang
Q. Chen
M. Xu
See all reference authors