Information security is an important issue for any organization or individual to protect data and information from unauthorized access. Valuable data and information are kept in the system connected through the computer network and are needed to secure against the intruders. Data Mining techniques provides solution to overcome the above mentioned problem. This book explores various data mining techniques like C-4.5, CART, CHAID, QUEST, Random Forest etc. with special reference to feature selection and used to develop models. An attempt has been made to develop ensemble model also, models were tested with many benchmark data sets like spam e-mail, KDD99, NSL-KDD and verified with many classification measures. These models as classifier are required to be deployed in the network or individual computer which will classify unwanted data and will alarm to the users for taking appropriate action. A brief experimental work has been carried out with above benchmark data sets using data mining software like WEKA and Clementine.
"Sinopsis" puede pertenecer a otra edición de este libro.
Dr. H.S.Hota has obtained his Ph.D. degree from Guru Ghasidas University, Bilaspur and currently working as Head and Associate Professor (Computer Science) in the department of Computer Science and Application,Bilaspur University Bilaspur, India. He has published many research papers in reputed journals and having 15 years of teaching experience.
"Sobre este título" puede pertenecer a otra edición de este libro.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Information security is an important issue for any organization or individual to protect data and information from unauthorized access. Valuable data and information are kept in the system connected through the computer network and are needed to secure against the intruders. Data Mining techniques provides solution to overcome the above mentioned problem. This book explores various data mining techniques like C-4.5, CART, CHAID, QUEST, Random Forest etc. with special reference to feature selection and used to develop models. An attempt has been made to develop ensemble model also, models were tested with many benchmark data sets like spam e-mail, KDD99, NSL-KDD and verified with many classification measures. These models as classifier are required to be deployed in the network or individual computer which will classify unwanted data and will alarm to the users for taking appropriate action. A brief experimental work has been carried out with above benchmark data sets using data mining software like WEKA and Clementine. 140 pp. Englisch. Nº de ref. del artículo: 9783659951145
Cantidad disponible: 2 disponibles
Librería: moluna, Greven, Alemania
Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Hota H.S.Dr. H.S.Hota has obtained his Ph.D. degree from Guru Ghasidas University, Bilaspur and currently working as Head and Associate Professor (Computer Science) in the department of Computer Science and Application,Bilaspur Univ. Nº de ref. del artículo: 158606983
Cantidad disponible: Más de 20 disponibles
Librería: Revaluation Books, Exeter, Reino Unido
Paperback. Condición: Brand New. 140 pages. 8.66x5.91x0.32 inches. In Stock. Nº de ref. del artículo: 3659951145
Cantidad disponible: 1 disponibles
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
Taschenbuch. Condición: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Information security is an important issue for any organization or individual to protect data and information from unauthorized access. Valuable data and information are kept in the system connected through the computer network and are needed to secure against the intruders. Data Mining techniques provides solution to overcome the above mentioned problem. This book explores various data mining techniques like C-4.5, CART, CHAID, QUEST, Random Forest etc. with special reference to feature selection and used to develop models. An attempt has been made to develop ensemble model also, models were tested with many benchmark data sets like spam e-mail, KDD99, NSL-KDD and verified with many classification measures. These models as classifier are required to be deployed in the network or individual computer which will classify unwanted data and will alarm to the users for taking appropriate action. A brief experimental work has been carried out with above benchmark data sets using data mining software like WEKA and Clementine.Books on Demand GmbH, Überseering 33, 22297 Hamburg 140 pp. Englisch. Nº de ref. del artículo: 9783659951145
Cantidad disponible: 1 disponibles
Librería: AHA-BUCH GmbH, Einbeck, Alemania
Taschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Information security is an important issue for any organization or individual to protect data and information from unauthorized access. Valuable data and information are kept in the system connected through the computer network and are needed to secure against the intruders. Data Mining techniques provides solution to overcome the above mentioned problem. This book explores various data mining techniques like C-4.5, CART, CHAID, QUEST, Random Forest etc. with special reference to feature selection and used to develop models. An attempt has been made to develop ensemble model also, models were tested with many benchmark data sets like spam e-mail, KDD99, NSL-KDD and verified with many classification measures. These models as classifier are required to be deployed in the network or individual computer which will classify unwanted data and will alarm to the users for taking appropriate action. A brief experimental work has been carried out with above benchmark data sets using data mining software like WEKA and Clementine. Nº de ref. del artículo: 9783659951145
Cantidad disponible: 1 disponibles