Effective mining on large databases for intrusion detection. Adinehnia, R., Udzir, N. I., Affendey, L. S., Ishak, I., & Hanapi, Z. M. In ISBAST, pages 204-207, 2014. IEEE. Link Paper bibtex @inproceedings{conf/isbast/AdinehniaUAIH14,
added-at = {2018-11-02T00:00:00.000+0100},
author = {Adinehnia, Reza and Udzir, Nur Izura and Affendey, Lilly Suriani and Ishak, Iskandar and Hanapi, Zurina Mohd},
biburl = {https://www.bibsonomy.org/bibtex/2e10b5103fdc80960960012dd064f335a/dblp},
booktitle = {ISBAST},
crossref = {conf/isbast/2014},
ee = {https://doi.org/10.1109/ISBAST.2014.7013122},
interhash = {d95a2ccee2deaf29b03cecceb43b3930},
intrahash = {e10b5103fdc80960960012dd064f335a},
isbn = {978-1-4799-6444-4},
keywords = {dblp},
pages = {204-207},
publisher = {IEEE},
timestamp = {2018-11-03T15:41:20.000+0100},
title = {Effective mining on large databases for intrusion detection.},
url = {http://dblp.uni-trier.de/db/conf/isbast/isbast2014.html#AdinehniaUAIH14},
year = 2014
}
Downloads: 0
{"_id":"oiG49PFsefqZuNJwg","bibbaseid":"adinehnia-udzir-affendey-ishak-hanapi-effectiveminingonlargedatabasesforintrusiondetection-2014","author_short":["Adinehnia, R.","Udzir, N. I.","Affendey, L. S.","Ishak, I.","Hanapi, Z. M."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2018-11-02T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Adinehnia"],"firstnames":["Reza"],"suffixes":[]},{"propositions":[],"lastnames":["Udzir"],"firstnames":["Nur","Izura"],"suffixes":[]},{"propositions":[],"lastnames":["Affendey"],"firstnames":["Lilly","Suriani"],"suffixes":[]},{"propositions":[],"lastnames":["Ishak"],"firstnames":["Iskandar"],"suffixes":[]},{"propositions":[],"lastnames":["Hanapi"],"firstnames":["Zurina","Mohd"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2e10b5103fdc80960960012dd064f335a/dblp","booktitle":"ISBAST","crossref":"conf/isbast/2014","ee":"https://doi.org/10.1109/ISBAST.2014.7013122","interhash":"d95a2ccee2deaf29b03cecceb43b3930","intrahash":"e10b5103fdc80960960012dd064f335a","isbn":"978-1-4799-6444-4","keywords":"dblp","pages":"204-207","publisher":"IEEE","timestamp":"2018-11-03T15:41:20.000+0100","title":"Effective mining on large databases for intrusion detection.","url":"http://dblp.uni-trier.de/db/conf/isbast/isbast2014.html#AdinehniaUAIH14","year":"2014","bibtex":"@inproceedings{conf/isbast/AdinehniaUAIH14,\n added-at = {2018-11-02T00:00:00.000+0100},\n author = {Adinehnia, Reza and Udzir, Nur Izura and Affendey, Lilly Suriani and Ishak, Iskandar and Hanapi, Zurina Mohd},\n biburl = {https://www.bibsonomy.org/bibtex/2e10b5103fdc80960960012dd064f335a/dblp},\n booktitle = {ISBAST},\n crossref = {conf/isbast/2014},\n ee = {https://doi.org/10.1109/ISBAST.2014.7013122},\n interhash = {d95a2ccee2deaf29b03cecceb43b3930},\n intrahash = {e10b5103fdc80960960012dd064f335a},\n isbn = {978-1-4799-6444-4},\n keywords = {dblp},\n pages = {204-207},\n publisher = {IEEE},\n timestamp = {2018-11-03T15:41:20.000+0100},\n title = {Effective mining on large databases for intrusion detection.},\n url = {http://dblp.uni-trier.de/db/conf/isbast/isbast2014.html#AdinehniaUAIH14},\n year = 2014\n}\n\n","author_short":["Adinehnia, R.","Udzir, N. I.","Affendey, L. S.","Ishak, I.","Hanapi, Z. M."],"key":"conf/isbast/AdinehniaUAIH14","id":"conf/isbast/AdinehniaUAIH14","bibbaseid":"adinehnia-udzir-affendey-ishak-hanapi-effectiveminingonlargedatabasesforintrusiondetection-2014","role":"author","urls":{"Link":"https://doi.org/10.1109/ISBAST.2014.7013122","Paper":"http://dblp.uni-trier.de/db/conf/isbast/isbast2014.html#AdinehniaUAIH14"},"keyword":["dblp"],"metadata":{"authorlinks":{}},"html":""},"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/suriani?items=1000","dataSources":["jexyJWRTc4s3dSBa7"],"keywords":["dblp"],"search_terms":["effective","mining","large","databases","intrusion","detection","adinehnia","udzir","affendey","ishak","hanapi"],"title":"Effective mining on large databases for intrusion detection.","year":2014}