DOI:10.20894/IJCNES.
Periodicity: Bi Annual.
Impact Factor:
SJIF:5.217
Submission:Any Time
Publisher:IIR Groups
Language:English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJCNES provides online manuscript tracking system.

Every issue of Journal of IJCNES is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCNES special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJCNES website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 6 Issue 2 Date of Publication:   December 2017

Analysis on Prediction of Network Traffic through Association Rule Mining

B.Subbulakshmi

Page(s):   66-71 ISSN:   2278-2397
DOI:   10.20894/IJCNES.103.006.002.008 Publisher:   Integrated Intelligent Research (IIR)


  1. Hanlin Goh,   "Fuzzy Associative Conjuncted Maps Network",   IEEE transactions on neural networks   ,Vol.20   ,Issue 8   ,2009
    View Artical

  2. Georgios Y.Lazarou,   "Describing network traffic using Index of variability",   IEEE/ACM Transactions on Networking   ,Vol.17   ,Issue 5   ,2009
    View Artical

  3. Kashi Venkatesh Vishwanath and Amin Vahdat,   "Swing: Realistic and Responsive network traffic generation.",   IEEE/ACM Transactions on Networking   ,Vol.17   ,Issue 3   ,2009
    View Artical

  4. Flora S. Tsai,   "Network Intrusion Detection Using Association Rules",   International Journal of Recent Trends in Engineer   ,Vol.2   ,Issue 2   ,2009
    View Artical

  5. Sunita Soni and O.P.Vyas,   "Using Associative classifiers for predictive analysis for health care data mining. ",   International Journal of Computer Applications   ,Vol.4   ,Issue 5   ,2010
    View Artical

  6. Javier J. S?nchez-Medina,   "Traffic signal optimization in ?La Almozara? district in Saragossa Under congestion conditions, usin",   IEEE transactions on Intelligent Transportation sy   ,Vol.11   ,Issue 1   ,2010
    View Artical

  7. Wei-Hsun Lee,   "Discovering traffic bottlenecks in an urban network by spatiotemporal data mining on Location based ",   IEEE Transactions on Intelligent Transportation Sy   ,Vol.12   ,Issue 4   ,2010
    View Artical

  8. Yun Yang and Ke Chen,   "Time series clustering via RPCL network ensemble with different representations",   IEEE Transactions on Systems, Man and Cybernetics   ,Vol.41   ,Issue 2   ,2011
    View Artical

  9. Ch.Srinivasa Rao,   "Firewall Policy Management through sliding window filtering method using data mining techniques",   International journal of computer science and engi   ,Vol.2   ,Issue 2   ,2011
    View Artical

  10. Daniela Brauckhoff,   "Anomaly extraction in backbone networks using association rules",   IEEE/ACM transactions on networking   ,Vol.20   ,Issue 6   ,2012
    View Artical

  11. Mr.B.Dwarakanath and Mr.A.Suthakar,   "Prediction and Detection of Malware Using Association Rules",   International Journal of Power Control Signal and    ,Vol.3   ,2012
    View Artical

  12. Anita Rajendra Zope,   "Data Mining Approach in Security Information and Event Management",   International Journal of Future Computer and Commu   ,Vol.2   ,Issue 2   ,2013
    View Artical

  13. Dilpreet kaur,   "A Study on User Future Request Prediction Methods Using Web Usage Mining",   International Journal of Computational Engineering   ,Vol.3   ,Issue 4   ,2013
    View Artical

  14. Zuleika Nascimento,   "A Hybrid Model for Network Traffic Identification Based on Association Rules and Self-Organizing Map",   The Ninth International Conference on Networking a   ,2013
    View Artical

  15. Ranjita Singh and Sreeja Nair,   "An Efficient Anomaly Detection System Using Featured Histogram and Fuzzy Rule Mining",   International Journal of Advanced Research in Comp   ,Vol.4   ,Issue 1   ,2014
    View Artical

  16. Hao Li and Chengchen Hu,   "MP- ROOM: Optimal matching on multiple PDUs for fine grained traffic identification",   IEEE Journal on Selected Areas in Communications   ,Vol.32   ,Issue 10   ,2014
    View Artical

  17. Azadeh Soltani and M.R Akbarzadeh,   "Confabulation- Inspired Association rule mining for rare and frequent itemsets",   IEEE transactions on neural networks and learning    ,Vol.25   ,Issue 11   ,2014
    View Artical

  18. Kamini Nalavade,   "Finding Frequent Itemsets using Apriori Algorihm to Detect Intrusions in Large Dataset. ",   International Journal of Computer Applications & I   ,Vol.6   ,Issue 1   ,2014
    View Artical

  19. Alexander A. Frolov,   "Comparison of Seven Methods for Boolean Factor Analysis and Their Evaluation by Information Gain",   IEEE Transactions on Neural Networks And Learning    ,Vol.    ,2015
    View Artical