"In this paper, the authors present an effective Tree based subspace CLUStering technique (TreeCLUS) for finding clusters in network intrusion data and for detecting known as well as unknown attacks without using any labeled traffic or signatures or training. To establish its effectiveness in finding appropriate number of clusters, they ...Download Now
In this paper, a Rough Set Theory (RST) based approach is proposed to mine concise rules from inconsistent data. The approach deals with inconsistent data. At first, it computes the lower and upper approximation for each concept, then adopts a learning from an algorithm to build concise classification rules for ...Download Now
The presence of transient network links, mobility and limited battery power of mobile nodes in MANETs poses a hefty challenge for such networks to scale and perform efficiently when subjected to varying network condition. Most of the topology control algorithms proposed have high control overhead to discover and maintain route ...Download Now
Next generation wireless network is foreseen as the combination of heterogeneous wireless networks capable of providing enhanced services to mobile users. Vertical handoff is a crucial issue in providing service to mobile users, in a heterogeneous network. To maintain continuous service during vertical handoff period, the handoff procedure should consider ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?