1. Network Anomaly Identification using Supervised Classifier;gogoi;Informatica,2013
2. False alarm minimization techniques in signature-based intrusion detection systems: A survey;hubballi;Computer Communications,2014
3. Intrusion Detection
4. Intrusion Detection System Using Weka Data Mining Tool;hassan;International Journal of Science and Research (IJSR),2017
5. Comparative Analysis of Random Forest, REP Tree and J48 Classifiers for Credit Risk Prediction;devasena;International Journal of Computer Applications (0975–8887) International Conference on Communication Computing and Information Technology (ICCCMIT-2014),0