Please use this identifier to cite or link to this item:
http://192.168.98.239:8080/jspui/handle/1994/1099
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.date.accessioned | 2018-03-01T11:07:28Z | - |
dc.date.available | 2018-03-01T11:07:28Z | - |
dc.date.issued | 2011-05 | - |
dc.identifier.uri | http://192.168.98.42:8080/jspui/handle/1994/1099 | - |
dc.description.abstract | Available | en_US |
dc.format.extent | 57p. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Tezpur University | en_US |
dc.subject | Computer Science and Engineering | en_US |
dc.subject | Network anomaly detection | en_US |
dc.title | Network intrusion datasets preparation and analysis using graph based approach | en_US |
dc.type | Technical Report | en_US |
dc.contributor.guide | Bhattacharyya, Dhruba Kumar | - |
dc.creator.researcher | Askari, Sikdar Md. Sultan | - |
Appears in Collections: | Dissertations |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title_1606.pdf | Title | 213.16 kB | Adobe PDF | View/Open |
02_abstract_1606.pdf | Abstract | 47.96 kB | Adobe PDF | View/Open |
03_cert_ack_decn_1606.pdf | Certificate, Declaration and Acknowledgement | 1.07 MB | Adobe PDF | View/Open |
04_cont_tab_fig_1606.pdf | List of Contents, Tables and Figures | 101.08 kB | Adobe PDF | View/Open |
05_main_chapters_1606.pdf Restricted Access | Main Chapters and References | 8.53 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.