메뉴 건너뛰기




Volumn 6, Issue , 2006, Pages 4880-4885

Application of feature selection and fuzzy ARTMAP to intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION (OF INFORMATION); COMPUTATION THEORY; FEATURE EXTRACTION; GENETIC ALGORITHMS; INTRUSION DETECTION;

EID: 34548136243     PISSN: 1062922X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSMC.2006.385078     Document Type: Conference Paper
Times cited : (11)

References (27)
  • 2
    • 33845310391 scopus 로고    scopus 로고
    • Genetic algorithm optimized feature transformation: A comparison with different classifiers
    • Z. Huang, M. Pei, E. Goodman, Y. Huang and G. Li, Genetic algorithm optimized feature transformation: a comparison with different classifiers, In Proc. GECCO 2003, 2003, pp. 2121-2133.
    • (2003) In Proc. GECCO 2003 , pp. 2121-2133
    • Huang, Z.1    Pei, M.2    Goodman, E.3    Huang, Y.4    Li, G.5
  • 4
    • 34548110417 scopus 로고    scopus 로고
    • W.F. Punch, E.D. Goodman, M. Pei, L. Chia-Shun, P. Hovland and R. Enbody, Further research on feature selection and classification using genetic algorithms. In Proc. 5th Int'l Conf. Genetic Algorithms, July 1993, pp. 557.
    • W.F. Punch, E.D. Goodman, M. Pei, L. Chia-Shun, P. Hovland and R. Enbody, Further research on feature selection and classification using genetic algorithms. In Proc. 5th Int'l Conf. Genetic Algorithms, July 1993, pp. 557.
  • 6
    • 19944364877 scopus 로고    scopus 로고
    • Feature deduction and ensemble design of Intrusion Detection System
    • C. Sriletha, A. Ajith and PT. Johnson, Feature deduction and ensemble design of Intrusion Detection System, Journal of Computer and security, vol. 24, 2005, pp.295-307.
    • (2005) Journal of Computer and security , vol.24 , pp. 295-307
    • Sriletha, C.1    Ajith, A.2    Johnson, P.T.3
  • 8
    • 0037986866 scopus 로고
    • Detecting unusual program behavior using the stastistical component of the nextgeneration intrusion detection expert system (NIDES)
    • Menlo Park, CA: SRI International;
    • D. Anderson, T.F. Lunt, H. Javitz, A. Tamaru and A. Valdes, Detecting unusual program behavior using the stastistical component of the nextgeneration intrusion detection expert system (NIDES), SRI-CSL-95-06, Menlo Park, CA: SRI International; 1995.
    • (1995) SRI-CSL-95-06
    • Anderson, D.1    Lunt, T.F.2    Javitz, H.3    Tamaru, A.4    Valdes, A.5
  • 9
    • 34548110415 scopus 로고    scopus 로고
    • A. Porras and P.G. Neumann, EMERALD: Event monitoring enabling responses to anomalous live disturbances, In Proceedings of the National Information Systems Security Conference, 1997, pp. 353-65.
    • A. Porras and P.G. Neumann, EMERALD: Event monitoring enabling responses to anomalous live disturbances, In Proceedings of the National Information Systems Security Conference, 1997, pp. 353-65.
  • 11
    • 85132011160 scopus 로고
    • An application of a recurrent network to an Intrusion Detection System
    • H. Debar and B. Dorizzi, An application of a recurrent network to an Intrusion Detection System, In Proceedings of IJCNN, 1992, pp.78-83.
    • (1992) In Proceedings of IJCNN , pp. 78-83
    • Debar, H.1    Dorizzi, B.2
  • 16
  • 19
    • 21844433474 scopus 로고    scopus 로고
    • Application of Online training SVM for real time intrusion detection,Compuier
    • Z. Zhang and H. Shen, Application of Online training SVM for real time intrusion detection,Compuier Communications,vol.28, 2005, pp.14281442.
    • (2005) Communications , vol.28 , pp. 14281442
    • Zhang, Z.1    Shen, H.2
  • 20
    • 31544469809 scopus 로고    scopus 로고
    • Degree prediction of malignancyin brain glioma using support vector machine
    • G. Li, J. Yang, C. Yo and D. Geng, Degree prediction of malignancyin brain glioma using support vector machine, Computers in Biology and Machine, vol. 36, 2006, pp.313-325.
    • (2006) Computers in Biology and Machine , vol.36 , pp. 313-325
    • Li, G.1    Yang, J.2    Yo, C.3    Geng, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.