DOI: https://doi.org/10.26483/ijarcs.v9i4

Published: 2018-08-20

DOI: https://doi.org/10.26483/ijarcs.v9i4.6120
DOI: https://doi.org/10.26483/ijarcs.v9i4.6171

INTRUSION DETECTION SYSTEM USING CLASSIFICATION APPROACH IN DATA MINING

Parminder Singh, Chandrashekhar Azad, Ashok Kumar Mehta

20-23

DOI: https://doi.org/10.26483/ijarcs.v9i4.6279
DOI: https://doi.org/10.26483/ijarcs.v9i4.6172
DOI: https://doi.org/10.26483/ijarcs.v9i4.6176
DOI: https://doi.org/10.26483/ijarcs.v9i4.6278
DOI: https://doi.org/10.26483/ijarcs.v9i4.6281

A COMPARATIVE STUDY OF ETL TOOLS

Deepti Durgawat, Manish Shrimali

47-49

DOI: https://doi.org/10.26483/ijarcs.v9i4.6849