-
1
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
Chebrolu, S., A. Abraham, J. Thomas, 2005, "Feature deduction and ensemble design of intrusion detection systems," Computers & Security, 24, 295-307.
-
(2005)
Computers & Security
, vol.24
, pp. 295-307
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.3
-
5
-
-
0038330235
-
Fusion of multiple classifiers for intrusion detection in computer networks
-
Giacinto, G., F. Roli, L. Didaci, 2003, "Fusion of multiple classifiers for intrusion detection in computer networks," Pattern Recognition Letters, 24, 1795-1803.
-
(2003)
Pattern Recognition Letters
, vol.24
, pp. 1795-1803
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
6
-
-
0242637092
-
Detecting intrusion with rule-based integration of multiple models
-
Han, S. J., S-B., Cho, 2003, "Detecting intrusion with rule-based integration of multiple models," Computers & Security, 22, 613-623.
-
(2003)
Computers & Security
, vol.22
, pp. 613-623
-
-
Han, S.J.1
Cho, S.-B.2
-
7
-
-
15744370034
-
A Taxonomy of network and computer attacks
-
Hansman, S. Hunt, R., 2005, "A Taxonomy of network and computer attacks," Computers & Security, 24, 31-43.
-
(2005)
Computers & Security
, vol.24
, pp. 31-43
-
-
Hansman, S.1
Hunt, R.2
-
8
-
-
85099325734
-
Irrelevant features and the subset selection problem
-
Morgan Kaufman, San Francisco
-
John, G., Kohavi, R., and Pfleger, K., 1994, "Irrelevant features and the subset selection problem", Int. Conf. on Machine Learning, Morgan Kaufman, San Francisco, 121-129
-
(1994)
Int. Conf. on Machine Learning
, pp. 121-129
-
-
John, G.1
Kohavi, R.2
Pfleger, K.3
-
9
-
-
0002105307
-
A hybrid genetic algorithm for classification
-
Kelly, J. D., Jr. and Davis, L., 1991, "A hybrid genetic algorithm for classification," Int. Joint Conf. on Artificial Intelligence, 645-650.
-
(1991)
Int. Joint Conf. on Artificial Intelligence
, pp. 645-650
-
-
Kelly Jr., J.D.1
Davis, L.2
-
10
-
-
0034171891
-
Identifying the impact of decision variables for nonlinear classification
-
Kim, S. H., Shin, S. W., 2000, "Identifying the impact of decision variables for nonlinear classification," Expert Systems Wish Applications, 18, 201-214.
-
(2000)
Expert Systems Wish Applications
, vol.18
, pp. 201-214
-
-
Kim, S.H.1
Shin, S.W.2
-
11
-
-
85146422424
-
A practical approach to feature selection
-
Kira, K., Rendell, L., 1992, "A Practical Approach to Feature Selection," Proc. of the Ninth International Conference on Machine Learning, 249-256.
-
(1992)
Proc. of the Ninth International Conference on Machine Learning
, pp. 249-256
-
-
Kira, K.1
Rendell, L.2
-
12
-
-
84992726552
-
Estimating attributes: Analysis and extensions of Relief
-
Kononenko, I., 1994, "Estimating attributes: Analysis and extensions of Relief. Proc. European Conf. Machine Learning, 171-182.
-
(1994)
Proc. European Conf. Machine Learning
, pp. 171-182
-
-
Kononenko, I.1
-
14
-
-
0032025353
-
Feature transformation and subset selection
-
Liu, H. and Motoda, H., 1998, "Feature transformation and subset selection," IEEE Intelligent Systems, 26-28.
-
(1998)
IEEE Intelligent Systems
, pp. 26-28
-
-
Liu, H.1
Motoda, H.2
-
16
-
-
10844230994
-
Intrusion detection using an ensemble of intelligent paradigms
-
Mukkamala, S., Andrew H. Sunga, A. Abraham, 2005, "Intrusion detection using an ensemble of intelligent paradigms," Journal of Network and Computer Applications, 28, 167-182.
-
(2005)
Journal of Network and Computer Applications
, vol.28
, pp. 167-182
-
-
Mukkamala, S.1
Sunga, A.H.2
Abraham, A.3
-
19
-
-
0003065528
-
Further research on feature selection and classification using genetic algorithms
-
Punch, W. F., Goodman, E. D., et al., 1993, "Further research on feature selection and classification using genetic algorithms," Int. Conf. on Genetic Algorithms, 557-564.
-
(1993)
Int. Conf. on Genetic Algorithms
, pp. 557-564
-
-
Punch, W.F.1
Goodman, E.D.2
-
20
-
-
0141990695
-
Theoretical and empirical analysis of ReliefF and RreliefF
-
Robnik-Sikonja, M., I. Kononenko, 2003, "Theoretical and empirical analysis of ReliefF and RreliefF," Machine Learning, 53, 23-69.
-
(2003)
Machine Learning
, vol.53
, pp. 23-69
-
-
Robnik-Sikonja, M.1
Kononenko, I.2
-
21
-
-
0024895461
-
A note on genetic algorithms for large-scale feature selection
-
Siedlecki, W. and Sklansky, J., 1989, "A note on genetic algorithms for large-scale feature selection," Pattern Recognition Letters, 10, 335-347.
-
(1989)
Pattern Recognition Letters
, vol.10
, pp. 335-347
-
-
Siedlecki, W.1
Sklansky, J.2
-
22
-
-
84962238645
-
Cost-based modeling for fraud and intrusion dectection: Results from the JAM project
-
Stolfo, S., W. Fan, W. Lee, A. Prodromidis, P. K. Chan, 2000, "Cost-based Modeling for Fraud and Intrusion Dectection: Results from the JAM Project," DARPA Information Survivability Conference.
-
(2000)
DARPA Information Survivability Conference
-
-
Stolfo, S.1
Fan, W.2
Lee, W.3
Prodromidis, A.4
Chan, P.K.5
-
23
-
-
0031073477
-
A review and empirical evaluation of feature weighting methods for a class of lazy learning algorithms
-
Wettschereck, D., Aha, D. W., and Mohri, T., 1997. "A review and empirical evaluation of feature weighting methods for a class of lazy learning algorithms," Artificial Intelligence Review, 11, 273-314.
-
(1997)
Artificial Intelligence Review
, vol.11
, pp. 273-314
-
-
Wettschereck, D.1
Aha, D.W.2
Mohri, T.3
-
24
-
-
0032028297
-
Feature subset selection using a genetic algorithm
-
Yang, J. H. and Honavar, V., 1998, "Feature subset selection using a genetic algorithm", IEEE Intelligent Systems, 44-49.
-
(1998)
IEEE Intelligent Systems
, pp. 44-49
-
-
Yang, J.H.1
Honavar, V.2
-
25
-
-
15944375471
-
A Intrusion detection using hierarchical neural networks
-
Zhang, C., J. Jiang, M. Kamel, 2005, "A Intrusion detection using hierarchical neural networks," Pattern Recognition Letters, 779-791.
-
(2005)
Pattern Recognition Letters
, pp. 779-791
-
-
Zhang, C.1
Jiang, J.2
Kamel, M.3
|