Sorry, we do not have enough data to show an influence graph for this author.
- Full text PDF available (1)
- This year (1)
- Last 5 years (1)
- Last 10 years (2)
Journals and Conferences
The traditional Intrusion Detection System (IDS) has limitations that it cannot detect emerging cyber threats. The goal of a Network Sniffer using data mining is to detect malicious traffic. This technique monitors all incoming and outgoing traffic. The deviation of the monitored traffic from the normal profile is measured. Various different implementations… (More)
In today's world steganography is very important due to the confidential communication between computer users over theinternet.Steganographyisknownastheapplicationofnon-visibletransmissionwhich is accomplishedbycloakingthe presence of any communication. Generally, data embedding is attained in various multimedia formats like image, text, audio,and is… (More)