INTRUSION DETECTION SYSTEM: Comparison of the Approaches

Start From page no- 65 4.1Comparison of the Approaches YOU NEED TO DEVELOP THE COMPARISION OF ALL THE APPROACHES Mention their Pros and cons of every approaches. • A1: Approach of Smith. • A2: Approach of Zhang and Lee. • A3: Approach of Albert et al • A4: Approach of Karachirski and guha • A5: […]