-
2
-
-
33845310391
-
Genetic algorithm optimized feature transformation: A comparison with different classifiers
-
Z. Huang, M. Pei, E. Goodman, Y. Huang and G. Li, Genetic algorithm optimized feature transformation: a comparison with different classifiers, In Proc. GECCO 2003, 2003, pp. 2121-2133.
-
(2003)
In Proc. GECCO 2003
, pp. 2121-2133
-
-
Huang, Z.1
Pei, M.2
Goodman, E.3
Huang, Y.4
Li, G.5
-
4
-
-
34548110417
-
-
W.F. Punch, E.D. Goodman, M. Pei, L. Chia-Shun, P. Hovland and R. Enbody, Further research on feature selection and classification using genetic algorithms. In Proc. 5th Int'l Conf. Genetic Algorithms, July 1993, pp. 557.
-
W.F. Punch, E.D. Goodman, M. Pei, L. Chia-Shun, P. Hovland and R. Enbody, Further research on feature selection and classification using genetic algorithms. In Proc. 5th Int'l Conf. Genetic Algorithms, July 1993, pp. 557.
-
-
-
-
6
-
-
19944364877
-
Feature deduction and ensemble design of Intrusion Detection System
-
C. Sriletha, A. Ajith and PT. Johnson, Feature deduction and ensemble design of Intrusion Detection System, Journal of Computer and security, vol. 24, 2005, pp.295-307.
-
(2005)
Journal of Computer and security
, vol.24
, pp. 295-307
-
-
Sriletha, C.1
Ajith, A.2
Johnson, P.T.3
-
8
-
-
0037986866
-
Detecting unusual program behavior using the stastistical component of the nextgeneration intrusion detection expert system (NIDES)
-
Menlo Park, CA: SRI International;
-
D. Anderson, T.F. Lunt, H. Javitz, A. Tamaru and A. Valdes, Detecting unusual program behavior using the stastistical component of the nextgeneration intrusion detection expert system (NIDES), SRI-CSL-95-06, Menlo Park, CA: SRI International; 1995.
-
(1995)
SRI-CSL-95-06
-
-
Anderson, D.1
Lunt, T.F.2
Javitz, H.3
Tamaru, A.4
Valdes, A.5
-
9
-
-
34548110415
-
-
A. Porras and P.G. Neumann, EMERALD: Event monitoring enabling responses to anomalous live disturbances, In Proceedings of the National Information Systems Security Conference, 1997, pp. 353-65.
-
A. Porras and P.G. Neumann, EMERALD: Event monitoring enabling responses to anomalous live disturbances, In Proceedings of the National Information Systems Security Conference, 1997, pp. 353-65.
-
-
-
-
11
-
-
85132011160
-
An application of a recurrent network to an Intrusion Detection System
-
H. Debar and B. Dorizzi, An application of a recurrent network to an Intrusion Detection System, In Proceedings of IJCNN, 1992, pp.78-83.
-
(1992)
In Proceedings of IJCNN
, pp. 78-83
-
-
Debar, H.1
Dorizzi, B.2
-
12
-
-
4944244751
-
Intrusion Detection on NN
-
Cambridge MA, MIT Press
-
J. Ryan, M.J. Lin and R. Mikkulalan, Intrusion Detection on NN, Advances in Neural Information Processing System, Cambridge MA, MIT Press, 1997.
-
(1997)
Advances in Neural Information Processing System
-
-
Ryan, J.1
Lin, M.J.2
Mikkulalan, R.3
-
13
-
-
0028384240
-
SOM neural network as a fuzzy classifier
-
S. Mitra and S.K. Pal, SOM neural network as a fuzzy classifier, IEEE Transaction of Systems, Man and Cybernetics, vol. 24, no.3 pp. 385-399, 1994.
-
(1994)
IEEE Transaction of Systems, Man and Cybernetics
, vol.24
, Issue.3
, pp. 385-399
-
-
Mitra, S.1
Pal, S.K.2
-
15
-
-
10844230994
-
-
S. Mukkamala, A.H. Sung and A. Ajith, Intrusion Detection using intelligent paradigm,Journal of Network and Computer Application, vol. 28, 2005, pp. 167-182.
-
(2005)
Intrusion Detection using intelligent paradigm,Journal of Network and Computer Application
, vol.28
, pp. 167-182
-
-
Mukkamala, S.1
Sung, A.H.2
Ajith, A.3
-
16
-
-
15944375471
-
Intrusion Detection using hierachical NN
-
C. Zhong, J. Jiong and M. Kanel, Intrusion Detection using hierachical NN, Pattern Recognition Letters, vol. 26,2005, pp. 779-791.
-
(2005)
Pattern Recognition Letters
, vol.26
, pp. 779-791
-
-
Zhong, C.1
Jiong, J.2
Kanel, M.3
-
18
-
-
24944563451
-
Robust SVM for anomaly detection in Computer Security
-
LA California
-
W. Hu, Y. Liao, V. Rao and R.R. Venurri, Robust SVM for anomaly detection in Computer Security, In Proceedings of the 2003 International Conf. on MC and Application, LA California, 2003.
-
(2003)
Proceedings of the 2003 International Conf. on MC and Application
-
-
Hu, W.1
Liao, Y.2
Rao, V.3
Venurri, R.R.4
-
19
-
-
21844433474
-
Application of Online training SVM for real time intrusion detection,Compuier
-
Z. Zhang and H. Shen, Application of Online training SVM for real time intrusion detection,Compuier Communications,vol.28, 2005, pp.14281442.
-
(2005)
Communications
, vol.28
, pp. 14281442
-
-
Zhang, Z.1
Shen, H.2
-
20
-
-
31544469809
-
Degree prediction of malignancyin brain glioma using support vector machine
-
G. Li, J. Yang, C. Yo and D. Geng, Degree prediction of malignancyin brain glioma using support vector machine, Computers in Biology and Machine, vol. 36, 2006, pp.313-325.
-
(2006)
Computers in Biology and Machine
, vol.36
, pp. 313-325
-
-
Li, G.1
Yang, J.2
Yo, C.3
Geng, D.4
-
21
-
-
0033220764
-
Adaptive floating search methods in feature Selection
-
B. Somol and P. Pudil, J. Novovicova and P. Paclik, Adaptive floating search methods in feature Selection, Pattern Recognition Letters, vol. 3, 1998, pp. 1157- 1163.
-
(1998)
Pattern Recognition Letters
, vol.3
, pp. 1157-1163
-
-
Somol, B.1
Pudil, P.2
Novovicova, J.3
Paclik, P.4
-
22
-
-
0026923589
-
Fuzzy ARTMAP: A neural network for incremental supervised learning of analog multidimensional maps
-
G.A. Carpenter, S. Grossberg, N. Markuzon, J.H. Reynold and D.B. Rosen, Fuzzy ARTMAP: A neural network for incremental supervised learning of analog multidimensional maps, IEEE Transactions on Neural Network, vol.3, no.5, 1992, pp. 689-713.
-
(1992)
IEEE Transactions on Neural Network
, vol.3
, Issue.5
, pp. 689-713
-
-
Carpenter, G.A.1
Grossberg, S.2
Markuzon, N.3
Reynold, J.H.4
Rosen, D.B.5
-
26
-
-
33745834241
-
-
University of carlifornia, Irvine, Department of Information and Computer Science
-
D.J. Newman, S. Hettich, C.L. Blake and C.J. Merz, UCI Respository of machine learning databases, http://www.ics.uci.edu/ mlearn/MLRepository.html, University of carlifornia, Irvine, Department of Information and Computer Science, 1998.
-
(1998)
UCI Respository of machine learning databases
-
-
Newman, D.J.1
Hettich, S.2
Blake, C.L.3
Merz, C.J.4
|