dc.contributor.author | Benaissa, Safa | |
dc.date.accessioned | 2025-03-18T11:08:22Z | |
dc.date.available | 2025-03-18T11:08:22Z | |
dc.date.issued | 2024 | |
dc.identifier.uri | http://depot.umc.edu.dz/handle/123456789/14542 | |
dc.description.abstract | he exponential development of digital technology exposes systems to increasingly high security risks, making intrusion detection a major issue in this context. In this study, the authors present a two-step approach. First, three attribute evaluators are used to reduce the dimensionality of the dataset and select the relevant attributes | fr_FR |
dc.title | Lowering features to optimizing intrusion detection | fr_FR |
dc.type | Article | fr_FR |