-
1
-
-
33847142898
-
-
Agarwal, R. and Joshi, M.V. (2000) PNrule: A New Framework for Learning Classifier Models in Data Mining, Technical TR 00-015, Department of Computer Science, University of Minnesota, Minneapolis, MN 55455.
-
Agarwal, R. and Joshi, M.V. (2000) PNrule: A New Framework for Learning Classifier Models in Data Mining, Technical TR 00-015, Department of Computer Science, University of Minnesota, Minneapolis, MN 55455.
-
-
-
-
2
-
-
24044435942
-
Reducing multiclass to binary: A unifying approach for margin classifiers
-
December
-
Allwein, E.L., Schapire, R.E. and Singer, Y. (2000) 'Reducing multiclass to binary: a unifying approach for margin classifiers', Journal of Machine Learning Research, December, Vol. 1, pp.113-141.
-
(2000)
Journal of Machine Learning Research
, vol.1
, pp. 113-141
-
-
Allwein, E.L.1
Schapire, R.E.2
Singer, Y.3
-
3
-
-
33847167206
-
Multicategory classification by support vector machines
-
Morgan Kaufmann, San Francisco, California, pp
-
Bredensteiner, E.J. and Bennett, K.P. (2000) 'Multicategory classification by support vector machines', Proceedings of the Seventeenth International Conference on Machine Learning, Morgan Kaufmann, San Francisco, California, pp.57-64.
-
(2000)
Proceedings of the Seventeenth International Conference on Machine Learning
, pp. 57-64
-
-
Bredensteiner, E.J.1
Bennett, K.P.2
-
4
-
-
69549123046
-
Errorcorrecting output codes: A general method for improving multiclass inductive learning programs
-
Dean, T.L. and McKeown, K, Eds, AAAI Press, Menlo Park, CA, pp
-
Dietterich, T.G. and Bakiri, G. (1991) 'Errorcorrecting output codes: a general method for improving multiclass inductive learning programs', in Dean, T.L. and McKeown, K. (Eds.): Proceedings of the Ninth AAAI National Conference on Artificial Intelligence, AAAI Press, Menlo Park, CA, pp.572-577.
-
(1991)
Proceedings of the Ninth AAAI National Conference on Artificial Intelligence
, pp. 572-577
-
-
Dietterich, T.G.1
Bakiri, G.2
-
5
-
-
0000406788
-
Solving multiclass learning problems via error-correcting output codes
-
Dietterich, T.G. and Bakiri, G. (1995) 'Solving multiclass learning problems via error-correcting output codes', Journal of Artificial Intelligence Research, Vol. 2, pp. 263-286.
-
(1995)
Journal of Artificial Intelligence Research
, vol.2
, pp. 263-286
-
-
Dietterich, T.G.1
Bakiri, G.2
-
6
-
-
35248866563
-
-
Duan, K., Keerthi, S.S. and Chu, W. (2003) 'Multi-category classification by soft-max combination of binary classifiers'. In Multiple Classifier Systems, Lecture Notes in Computer Science. 11-13 June. Springer, Guilford, UK, 2709. pp. 125-134.
-
Duan, K., Keerthi, S.S. and Chu, W. (2003) 'Multi-category classification by soft-max combination of binary classifiers'. In Multiple Classifier Systems, Lecture Notes in Computer Science. 11-13 June. Springer, Guilford, UK, Vol. 2709. pp. 125-134.
-
-
-
-
7
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
Durst, R., Champion, T., Wirten, B., Miller, E. and Spagnuolo, L. (1999) 'Testing and evaluating computer intrusion detection systems'. Communications of the ACM, Vol. 42, No, 7, pp.53-61.
-
(1999)
Communications of the ACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Wirten, B.3
Miller, E.4
Spagnuolo, L.5
-
8
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
Barbará, D. and Jajodia, S, Eds
-
Eskin, E., Arnold, A., Prerau, M., Portnoy, L. and Stolfo, S. (2002) 'A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data'. Barbará, D. and Jajodia, S. (Eds.): Applications of Data Mining in Computer Security, Advances in Information Security, Vol. 6, p.272.
-
(2002)
Applications of Data Mining in Computer Security, Advances in Information Security
, vol.6
, pp. 272
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
9
-
-
0036291381
-
Digit recognition in noisy environments via a sequential gmm/svm system
-
Fine, S., Saon, G. and Gopinath, R.A. (2002) 'Digit recognition in noisy environments via a sequential gmm/svm system', In IEEE International Conference On Acoustics. Speech, and Signal Processing. May 13-17, Vol. 1. pp.1-49-1-52.
-
(2002)
IEEE International Conference On Acoustics. Speech, and Signal Processing. May 13-17
, vol.1
-
-
Fine, S.1
Saon, G.2
Gopinath, R.A.3
-
11
-
-
33847172911
-
-
Geleyn, E. (2002) Combining Decision Trees for Software Quality Classification: An Empirical Study, Master's thesis. Advised by Khoshgoftaar, T.M., May, Florida Atlantic University. Boca Raton. FL. USA.
-
Geleyn, E. (2002) Combining Decision Trees for Software Quality Classification: An Empirical Study, Master's thesis. Advised by Khoshgoftaar, T.M., May, Florida Atlantic University. Boca Raton. FL. USA.
-
-
-
-
12
-
-
33847124158
-
-
Gomez, J. and Dasgupta, D. (2001) 'Evolving fuzzy classifiers for intrusion detection'. In Proceedings of the 2002 IEEE. Workshop on Information Assurance. June. United States Military Academy, West Point, NY.
-
Gomez, J. and Dasgupta, D. (2001) 'Evolving fuzzy classifiers for intrusion detection'. In Proceedings of the 2002 IEEE. Workshop on Information Assurance. June. United States Military Academy, West Point, NY.
-
-
-
-
13
-
-
84948667727
-
-
Gomez, J., Dasgupta, D., Nasaroui, O. and Gonzalez, F. (2002) 'Complete expressions trees for evolving fuzzy classifier systems with genetic algorithms and application to network intrusion detection', In proceedings of the North American Fiery Information Processing Society, June, pp.63-78.
-
Gomez, J., Dasgupta, D., Nasaroui, O. and Gonzalez, F. (2002) 'Complete expressions trees for evolving fuzzy classifier systems with genetic algorithms and application to network intrusion detection', In proceedings of the North American Fiery Information Processing Society, June, pp.63-78.
-
-
-
-
14
-
-
0032355984
-
Classification by pairwise coupling
-
Hastie, T. and Tibshirani, R. (1998) 'Classification by pairwise coupling', Journal of The Annals of Statistics, Vol. 26, No. 2, pp.451-471.
-
(1998)
Journal of The Annals of Statistics
, vol.26
, Issue.2
, pp. 451-471
-
-
Hastie, T.1
Tibshirani, R.2
-
15
-
-
0003675176
-
-
2nd ed, Prentice Hall. Englewood Cliffs, NJ, USA
-
Johnson, R.A. and Wichern, D.W. (1992) Applied Multivariate Statistical Analysis, 2nd ed., Prentice Hall. Englewood Cliffs, NJ, USA.
-
(1992)
Applied Multivariate Statistical Analysis
-
-
Johnson, R.A.1
Wichern, D.W.2
-
17
-
-
0034197704
-
A practical classificationrule for software quality models
-
June
-
Khoshgoftaar, T.M. and Allen, E.B. (2000) 'A practical classificationrule for software quality models'. IEEE Transactions on Reliability, June, Vol. 49, No. 2, pp.209-216.
-
(2000)
IEEE Transactions on Reliability
, vol.49
, Issue.2
, pp. 209-216
-
-
Khoshgoftaar, T.M.1
Allen, E.B.2
-
18
-
-
0036891333
-
Using regression trees to classify fault-prone software modules
-
December
-
Khoshgoftaar, T.M., Allen, E.B. and Deng, J. (2002) 'Using regression trees to classify fault-prone software modules'. IEEE Transactions on Reliability, December. Vol. 51, No. 4, pp.455-462.
-
(2002)
IEEE Transactions on Reliability
, vol.51
, Issue.4
, pp. 455-462
-
-
Khoshgoftaar, T.M.1
Allen, E.B.2
Deng, J.3
-
19
-
-
33847125017
-
-
Khoshgoftaar, T.M., Gao, K. and Wang, Y. (2004) 'A comparative study of classification algorithms for network intrusion detection', in Pham. H. and Yamada, S. (Eds,): Proceedings of the 10th International Conference on Reliability and Quality in Design. 5-7 August. International Society of Science and Applied Technologies, Las Vegas, Nevada. USA. pp.168-172.
-
Khoshgoftaar, T.M., Gao, K. and Wang, Y. (2004) 'A comparative study of classification algorithms for network intrusion detection', in Pham. H. and Yamada, S. (Eds,): Proceedings of the 10th International Conference on Reliability and Quality in Design. 5-7 August. International Society of Science and Applied Technologies, Las Vegas, Nevada. USA. pp.168-172.
-
-
-
-
20
-
-
85009255613
-
Combined binary classifiers with applications to speech recognition
-
16-20 September. Denver. Colorado. USA, pp
-
Klautau, A., Jevtic, N. and Orlitsky, A. (2002) 'Combined binary classifiers with applications to speech recognition'. In Seventh International Conference on Spoken Language Processing. 16-20 September. Denver. Colorado. USA, pp.2469-2472.
-
(2002)
Seventh International Conference on Spoken Language Processing
, pp. 2469-2472
-
-
Klautau, A.1
Jevtic, N.2
Orlitsky, A.3
-
21
-
-
26544450026
-
Automated intrusion detection methods using NFR
-
9-12th April, Santa Clara. California. USA, pp
-
Lee, W., Park, C. and Stoflo, S. (1999a) 'Automated intrusion detection methods using NFR', Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring, 9-12th April, Santa Clara. California. USA, pp.63-72.
-
(1999)
Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring
, pp. 63-72
-
-
Lee, W.1
Park, C.2
Stoflo, S.3
-
22
-
-
0013114810
-
Mining in a data-ow environment: Experience in network intrusion detection
-
Chaudhuri, S. and Madigan, D, Eds
-
Lee, W., Stolfo, S. and Mok, K. (1999b) 'Mining in a data-ow environment: experience in network intrusion detection', in Chaudhuri, S. and Madigan, D. (Eds.): Proceedings of the Fifth International Conference on Knowledge Discovery and Data Mining (KDD-99). pp. 114-124.
-
(1999)
Proceedings of the Fifth International Conference on Knowledge Discovery and Data Mining (KDD-99)
, pp. 114-124
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
23
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
Lee, W., Fan, W., Miller, M., Stolfo, S. and Zadok, E. (2002) 'Toward cost-sensitive modeling for intrusion detection and response'. Journal of Computer Security. Vol. 10, Nos. 1-2, pp.5-22.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 5-22
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.4
Zadok, E.5
-
24
-
-
33847141583
-
-
Lin, H. (2004) Techniques for Combining Binary Classifiers: A Comparative Study in Network Intrusion Detection Systems. Master's Thesis, May. Advised by Khoshgoftaar, T.M., Florida Atlantic University, Boca Raton, FL. USA.
-
Lin, H. (2004) Techniques for Combining Binary Classifiers: A Comparative Study in Network Intrusion Detection Systems. Master's Thesis, May. Advised by Khoshgoftaar, T.M., Florida Atlantic University, Boca Raton, FL. USA.
-
-
-
-
25
-
-
0032630098
-
Detecting computer and network misuse through the production based expert system toolset (p-best)
-
May. Oakland. IEEE Computer Society Press. Los Alamitos. California, pp
-
Lindqvist, U. and Porras, P. (1999) 'Detecting computer and network misuse through the production based expert system toolset (p-best)'. Proceedings of the 1999 IEEE Symposium on Security and Privacy. May. Oakland. IEEE Computer Society Press. Los Alamitos. California, pp.146-161.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.2
-
26
-
-
0034301517
-
The 1999 DARPA offline intrusion detection evaluation
-
Lippmann, R., Haines, J.W., Fried, D.J., Korba, J. and Das, K. (2000) 'The 1999 DARPA offline intrusion detection evaluation'. Computer Networks. Vol. 34, pp.579-595.
-
(2000)
Computer Networks
, vol.34
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
27
-
-
24744463914
-
Using Key-String Selection and Neural Networks to Reduce False Alarms and Detect New Attacks with Sniffer-Based Intrusion Detection Systems
-
West Lafayette, September, Indiana, pp
-
Lippmann, R.P. and Cunningham, R.K. (1999) Using Key-String Selection and Neural Networks to Reduce False Alarms and Detect New Attacks with Sniffer-Based Intrusion Detection Systems, in RAID 1999 Conference. West Lafayette, September, Indiana, pp.7-9.
-
(1999)
RAID 1999 Conference
, pp. 7-9
-
-
Lippmann, R.P.1
Cunningham, R.K.2
-
28
-
-
84867071286
-
-
Masulli, F. and Alentini, G. (2000) 'Effectiveness of error correcting output coding methods in ensemble, In Multiple Classifier Systems, Lecture Notes in Computer Science. 21-23 June, Springer, Cagliari, Italy, 1857, pp.107-116.
-
Masulli, F. and Alentini, G. (2000) 'Effectiveness of error correcting output coding methods in ensemble", In Multiple Classifier Systems, Lecture Notes in Computer Science. 21-23 June, Springer, Cagliari, Italy, Vol. 1857, pp.107-116.
-
-
-
-
29
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
November, pp
-
McHugh, J. (2000) 'Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory'. ACM Transactions on Information and System Security, Vol. 3, No. 4. November, pp.262-294.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
30
-
-
33847151850
-
Performance based feature identification for intrusion detection using support vector machines
-
Santiago. Chile. 01-04 December, pp
-
Mukkamala, S. and Sung, A.M. (2002) 'Performance based feature identification for intrusion detection using support vector machines'. The Second International Conference on Hybrid Intelligent Systems. Santiago. Chile. 01-04 December, pp.351-364
-
(2002)
The Second International Conference on Hybrid Intelligent Systems
, pp. 351-364
-
-
Mukkamala, S.1
Sung, A.M.2
-
31
-
-
0347606556
-
Winning the kdd99 classification cup: Bagged boosting
-
Pfahringer, B. (2000) 'Winning the kdd99 classification cup: bagged boosting'. ACM SIGKDD Explorations Newsletter, Vol. 1, No. 2, pp.65, 66.
-
(2000)
ACM SIGKDD Explorations Newsletter
, vol.1
, Issue.2
-
-
Pfahringer, B.1
-
32
-
-
33847137889
-
-
Portnoy, L., Eskin, E. and Stolfo, S.J. (2001) 'Intrusion detection with unlabeled data using clustering', In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA- 2001), 5-8 November, Philadelphia, PA. pp.51-62.
-
Portnoy, L., Eskin, E. and Stolfo, S.J. (2001) 'Intrusion detection with unlabeled data using clustering', In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA- 2001), 5-8 November, Philadelphia, PA. pp.51-62.
-
-
-
-
33
-
-
0023417432
-
Simplifying decision trees'. International Journal of Man-Machine Studies, Special Issue
-
December
-
Quinlan, R.J. (1987) 'Simplifying decision trees'. International Journal of Man-Machine Studies, Special Issue: Knowledge Acquisition for Knowledge-based Systems. Part 5. December, Vol. 27, No. 3, pp.221-234.
-
(1987)
Knowledge Acquisition for Knowledge-based Systems. Part 5
, vol.27
, Issue.3
, pp. 221-234
-
-
Quinlan, R.J.1
-
34
-
-
0000383868
-
Parallel networks that learn to pronounce English text
-
Sejnowski, T.J. and Rosenberg, C.R. (1987) 'Parallel networks that learn to pronounce English text', Journal of Complex Systems, Vol. 1, pp. 145-168.
-
(1987)
Journal of Complex Systems
, vol.1
, pp. 145-168
-
-
Sejnowski, T.J.1
Rosenberg, C.R.2
-
35
-
-
84898996216
-
Speech recognition using SVMs
-
Dietterich, T.G, Becker, S. and Ghahramani, Z, Eds, December, Vancouver, British Columbia, Canada
-
Smith, N. and Gales, M. (2001) 'Speech recognition using SVMs', in Dietterich, T.G., Becker, S. and Ghahramani, Z. (Eds.): Advances in Neural Information Processing Systems 14 Proceedings of the 2001 Neural Information Processing Systems (Nips) Conference, December, Vancouver, British Columbia, Canada.
-
(2001)
Advances in Neural Information Processing Systems 14 Proceedings of the 2001 Neural Information Processing Systems (Nips) Conference
-
-
Smith, N.1
Gales, M.2
-
36
-
-
84962238645
-
Cost-based modeling for fraud and intrusion detection: Results from the JAM project
-
25th-27th January, Hilton Head, South Carolina
-
Stolfo, S.J., Fan, W. and Lee, W. (2000) 'Cost-based modeling for fraud and intrusion detection: results from the JAM project', Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, 25th-27th January, Hilton Head, South Carolina, Vol. 2, pp.1130-1144.
-
(2000)
Proceedings of the 2000 DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 1130-1144
-
-
Stolfo, S.J.1
Fan, W.2
Lee, W.3
|