Article,

Developing an Algorithm to Implement Efficient Intrusion Detection System using Soft Computing

, , and .
International Journal of Innovative Science and Modern Engineering (IJISME), 1 (6): 35-39 (May 2013)

Abstract

During last decades information technologies based on the computer networks play an important role in various spheres of human activity. Information has become the organizations most precious asset. Organizations have become increasingly dependent on the information since more information is being stored and processed on network-based systems. The widespread use of e-commerce has increased the necessity of protecting the system to a very high extent. Problems of great importance are entrusted on them, such as keeping, transmission and automation of information processing. The security level of processed information can vary from private and commercial to military and state secret.

Tags

Users

  • @ijisme_beiesp

Comments and Reviewsshow / hide

  • @ijisme_beiesp
    3 years ago (last updated 3 years ago)
    good
Please log in to take part in the discussion (add own reviews or comments).