<> "The repository administrator has not yet configured an RDF license."^^ . <> . . . "Comparative analysis of intrusion detection approaches"^^ . "Information security is a serious issue especially in present age because a solo attack may cause a big harm in computer and network systems. Several intrusion detection approaches exist to tackle this critical issue but the problem is which one is more suitable in the field of intrusion. Further, these approaches are used in intrusion detection systems. Therefore, in this paper, we evaluated them so that a suitable approach may be advised to intrusion detection systems. This work describes the concepts, tool and methodology being used for evaluation analysis of different intrusion detection approaches using multi-criteria decision making technique. Moreover, conclusion on results is made and direction for future works is presented. © 2010 IEEE."^^ . "2010" . . . "UKSim2010 - UKSim 12th International Conference on Computer Modelling and Simulation"^^ . . . . . . . . . . . . . . "A.S."^^ . "Alghamdi"^^ . "A.S. Alghamdi"^^ . . "A.B."^^ . "Abdullah"^^ . "A.B. Abdullah"^^ . . "I."^^ . "Ahmad"^^ . "I. Ahmad"^^ . . . . . "HTML Summary of #1208 \n\nComparative analysis of intrusion detection approaches\n\n" . "text/html" . .