Downloads
Effective Utilization of Data Mining Techniques for Digital Security
Authors
Abstract
In this paper we brainstorm and discuss about different data mining methods that we have effectively connected for digital security. These applications incorporate however are not restricted to pernicious code location by mining double executables, system interruption recognition by mining system movement, peculiarity discovery, and information stream mining. Data mining based interruption location instruments are amazingly valuable in finding security breaks.
Article Details
Published
2016-12-30
Issue
Section
Articles
How to Cite
Effective Utilization of Data Mining Techniques for Digital Security. (2016). International Journal of Engineering and Computer Science, 5(12). http://www.ijecs.in/index.php/ijecs/article/view/3216