← Back to VOLUME 3, ISSUE 4, APRIL 2014
This work is licensed under a Creative Commons Attribution 4.0 International License.
Detecting User-To-Root (U2R) Attacks Based on Various Machine Learning Techniques
S.REVATHI, DR. A.MALATHI Ph.D. Research Scholar, PG and Research, Department of Computer Science, Government Arts College, Coimbatore, India Assistant Professor, PG and Research, Department of Computer Science, Government Arts College, Coimbatore, India
π 27 views
Downloads: Download PDF
How to Cite:
[1] S.REVATHI, DR. A.MALATHI Ph.D. Research Scholar, PG and Research, Department of Computer Science, Government Arts College, Coimbatore, India Assistant Professor, PG and Research, Department of Computer Science, Government Arts College, Coimbatore, India, βDetecting User-To-Root (U2R) Attacks Based on Various Machine Learning Techniques,β International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)
