Downloads

Effective Utilization of Data Mining Techniques for Digital Security

Authors

Farhad Alam ,Vishal Shukla1

Abstract

In this paper we brainstorm and discuss about different data mining methods that we have effectively connected for digital security. These applications incorporate however are not restricted to pernicious code location by mining double executables, system interruption recognition by mining system movement, peculiarity discovery, and information stream mining. Data mining based interruption location instruments are amazingly valuable in finding security breaks.

Article Details

Published

2016-12-30

Section

Articles

How to Cite

Effective Utilization of Data Mining Techniques for Digital Security. (2016). International Journal of Engineering and Computer Science, 5(12). http://www.ijecs.in/index.php/ijecs/article/view/3216