-
2
-
-
0033293396
-
Towards a Taxonomy of Intrusion Detection Systems, IBM Technical Paper
-
April
-
Herv Debar, Maro Dacier, and Andreas Wespi, "Towards a Taxonomy of Intrusion Detection Systems", IBM Technical Paper, Computer Networks, Vol.39, Issue 9, pp. 805-822, April 1999.
-
(1999)
Computer Networks
, vol.39
, Issue.9
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
3
-
-
0038223829
-
-
NIST Special Publication on Intrusion Detection System, 31 November
-
R. Bace and P. Mell, "Intrusion Detection Systems", NIST Special Publication on Intrusion Detection System, 31 November 2001.
-
(2001)
Intrusion Detection Systems
-
-
Bace, R.1
Mell, P.2
-
6
-
-
0009956176
-
Machine Learning techniques for the computer Security
-
PhD thesis, Purdue University
-
T.Lane, "Machine Learning techniques for the computer Security", PhD thesis, Purdue University, 2000.
-
(2000)
-
-
Lane, T.1
-
7
-
-
34547568079
-
A new intrusion detection method, based on discriminant analysis
-
May
-
Madori Asaka, Takefumi Onabuta, Tadashi Inoue, Shunji Okazawa, and Shigeki Goto, "A new intrusion detection method, based on discriminant analysis", Oakland, pp. 130-143, May 2001.
-
(2001)
Oakland
, pp. 130-143
-
-
Asaka, M.1
Onabuta, T.2
Inoue, T.3
Okazawa, S.4
Goto, S.5
-
8
-
-
6344223434
-
Using Statistical Analysis and Support Vector Machine Classification to Detection Complicated Attacks
-
Learning and Cybernetics IEEE Computer Society, Shanghai, China, August 26-29
-
Ming Tang, Song-Can Chen, Yi Zhuang and Jia Liu, "Using Statistical Analysis and Support Vector Machine Classification to Detection Complicated Attacks", Proc. Of the Third International Conference on Machine, Learning and Cybernetics IEEE Computer Society, Shanghai, China, August 26-29, 2004.
-
(2004)
Proc. Of the Third International Conference on Machine
-
-
Tang, M.1
Chen, S.2
Zhuang, Y.3
Liu, J.4
-
9
-
-
0033636139
-
Support vector machine classification and validation of cancer tissue samples using microarray expression data
-
Furey, T.S., Cristianini, N., Duffy, N., Beddarski, K.W., Schummer, M. and Haussler, "Support vector machine classification and validation of cancer tissue samples using microarray expression data," Bioinformatics, vol. 16, pp.906-914, 2000.
-
(2000)
Bioinformatics
, vol.16
, pp. 906-914
-
-
Furey, T.S.1
Cristianini, N.2
Duffy, N.3
Beddarski, K.W.4
Schummer, M.5
Haussler6
-
10
-
-
0036161259
-
Gene selection for cancer classification using support vector machines
-
Guyon, I., Weston, J., Barnhill, S. and Vapnik, V., "Gene selection for cancer classification using support vector machines," Machine Learning, Vol. 46, pp.389-422, 2002.
-
(2002)
Machine Learning
, vol.46
, pp. 389-422
-
-
Guyon, I.1
Weston, J.2
Barnhill, S.3
Vapnik, V.4
-
11
-
-
0038729565
-
Classification of multiple cancer types be multicategory support vector machines using gene expression data
-
Lee, Y. and Lee, C.-K., "Classification of multiple cancer types be multicategory support vector machines using gene expression data," Bioinformatics, vol. 18, pp. 1132-1139, 2003.
-
(2003)
Bioinformatics
, vol.18
, pp. 1132-1139
-
-
Lee, Y.1
Lee, C.-K.2
-
12
-
-
84888264031
-
Fearture Selection using PSO-SVM
-
Hong Kong
-
Chung-Jui Tu, Li-Yeh Chuang, Jun-Yang Chang, and Cheng-Hong Yang, "Fearture Selection using PSO-SVM", in Proc. International multiconf. Engineers and computer scientist, Hong Kong, 2006, pp.138-143.
-
(2006)
Proc. International multiconf. Engineers and computer scientist
, pp. 138-143
-
-
Tu, C.1
Chuang, L.2
Chang, J.3
Yang, C.4
-
13
-
-
30644462052
-
-
S. Chebrolu, A. Abraham, J. P., Thomas, Feature Deduction and Ensemble Design of Intrusion Detection Systems, Computer & Security, 2004.
-
(2004)
Feature Deduction and Ensemble Design of Intrusion Detection Systems, Computer & Security
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
14
-
-
34548766983
-
-
J. Twycross, Immune Systems, Danger Theory and Intrusion Detection, presented at the AISB 2004 Symposium on Immune System and Cognition, Leeds, U.K., March 2004.
-
J. Twycross, Immune Systems, "Danger Theory and Intrusion Detection", presented at the AISB 2004 Symposium on Immune System and Cognition, Leeds, U.K., March 2004.
-
-
-
-
15
-
-
33645961388
-
An artificial immune system for fuzzy-rule induction in data mining
-
R.T. Alves, M.R.B.S. Delgado, H.S. Lopes, A.A. Freitas, "An artificial immune system for fuzzy-rule induction in data mining", Lecture Notes in Computet Science, Berlin: Springer-Verlag, Vol.3242, 2004, pp. 1011-1020.
-
(2004)
Lecture Notes in Computet Science, Berlin: Springer-Verlag
, vol.3242
, pp. 1011-1020
-
-
Alves, R.T.1
Delgado, M.R.B.S.2
Lopes, H.S.3
Freitas, A.A.4
-
18
-
-
0000629975
-
Cross-Validation choice and assessment of statistical predictions
-
Stone, M., "Cross-Validation choice and assessment of statistical predictions," Journal of the Royal Statistical Society B, vol 36, pp. 111-147, 1974.
-
(1974)
Journal of the Royal Statistical Society B
, vol.36
, pp. 111-147
-
-
Stone, M.1
-
19
-
-
0031352450
-
-
Kennedy, J., Eberhart, R.C., A discrete binary Version of the particle swarm algorithm, Systems, Man, and Cyemetics, 1997. 'Computational Cybernetics and Simulation]., 1997 IEEE international Conference on 5, 12-15 Oct. 1997. pp.4104-4108.
-
Kennedy, J., Eberhart, R.C., "A discrete binary Version of the particle swarm algorithm", Systems, Man, and Cyemetics, 1997. 'Computational Cybernetics and Simulation]., 1997 IEEE international Conference on Volume 5, 12-15 Oct. 1997. pp.4104-4108.
-
-
-
-
20
-
-
0000897328
-
The Kernel-Adatron: A Fast and Simple Learning Procedure for Suuport Vector machines
-
Frieß, T., N. Cristianini, and C. Campbell, "The Kernel-Adatron: a Fast and Simple Learning Procedure for Suuport Vector machines," Proc. Of the Fifteenth Internaltional Conference on Machine Learning, pp. 188-196, 1998.
-
(1998)
Proc. Of the Fifteenth Internaltional Conference on Machine Learning
, pp. 188-196
-
-
Frieß, T.1
Cristianini, N.2
Campbell, C.3
-
21
-
-
84899013173
-
Support Vector regression Machines,
-
Moser, M, Jordan, M, and Petshe, T, ed, MIT Press, Cambridge, Ma, pp
-
Drucker, H., Burges, C., Kaufman, L., Smola, A. and Vapnik, "Support Vector regression Machines, " in Moser, M., Jordan, M., and Petshe, T. (ed.) Neural Information Processing Systems, Vol. 9. MIT Press, Cambridge, Ma, pp. 155-161. 1997.
-
(1997)
Neural Information Processing Systems
, vol.9
, pp. 155-161
-
-
Drucker, H.1
Burges, C.2
Kaufman, L.3
Smola, A.4
Vapnik5
-
23
-
-
0000759079
-
The Adatron-an adaptive perceptron algorihm
-
Anlauf, J.K., and Biehl, M., "The Adatron-an adaptive perceptron algorihm," Europhysics letters, 10, pp., 687-692. 1989.
-
(1989)
Europhysics letters
, vol.10
, pp. 687-692
-
-
Anlauf, J.K.1
Biehl, M.2
-
24
-
-
0011891024
-
Learning Time of Neural Networks; Exact Solution for a Perceptron Algorithm
-
Opper, M., "Learning Time of Neural Networks; Exact Solution for a Perceptron Algorithm," physical review A38:3824. 1988.
-
(1988)
physical review
, vol.A38
, pp. 3824
-
-
Opper, M.1
-
27
-
-
0003408420
-
-
MIT Press, Cambridge, MA
-
Scholkopf, B. and Smola, Learning with Kernels: support Vector Machines, Regularization, Optimization and Geyond. MIT Press, Cambridge, MA
-
Learning with Kernels: Support Vector Machines, Regularization, Optimization and Geyond
-
-
Scholkopf, B.1
Smola2
-
28
-
-
34548711176
-
-
KDD data set, 1999; http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html
-
(1999)
-
-
data set, K.D.D.1
-
29
-
-
84874124494
-
Visualization of anomaly detection, using prediction sensitivity
-
April
-
P. Laskov, K. Rieck, C. Schäfer, K.R. Müller, "Visualization of anomaly detection, using prediction sensitivity". Proc. of Sicherheit, April.2005, 197-208.
-
(2005)
Proc. of Sicherheit
, pp. 197-208
-
-
Laskov, P.1
Rieck, K.2
Schäfer, C.3
Müller, K.R.4
-
31
-
-
0003425664
-
Support Vector Machines for Classification and Regression
-
Technical report
-
Steven R. Gunn, "Support Vector Machines for Classification and Regression," Technical report, 1998.
-
(1998)
-
-
Gunn, S.R.1
-
32
-
-
34247187961
-
Proc. Int. Conf. on ICT-Mercu Buana ICT2005
-
W. Chimphlee, Abdul Hanan Abdullah, Mohd Noor Md Sap and S. Chimphlee, "Unsupervised Anomaly Detection, with Unlabeled Data Using Clustering", Proc. Int. Conf. on ICT-Mercu Buana ICT2005. 42-49.
-
-
-
Chimphlee, W.1
Hanan Abdullah, A.2
Noor, M.3
Sap, M.4
Chimphlee, S.5
-
33
-
-
5044228031
-
A Fuzzy Data Mining Based Intrusion Detection System
-
IEEE Computer Society, Suzhou, China, May 26-28
-
H. Jin, J. Sun, H. Chen, and Z. Han, A Fuzzy Data Mining Based Intrusion Detection System, Proc. of 10thInternational Workshop, an future Trends in Distributed Computing Systems (FTDCS04). IEEE Computer Society, Suzhou, China, May 26-28, 2004, 191-197.
-
(2004)
Proc. of 10thInternational Workshop, an future Trends in Distributed Computing Systems (FTDCS04)
, pp. 191-197
-
-
Jin, H.1
Sun, J.2
Chen, H.3
Han, Z.4
-
34
-
-
19544384880
-
A comparative study of anomaly detection schemes in network intrusion detection
-
A. Lazareyic, A. Ozgur, L. Ertoz, J. Srivastava, and V., Kumar, A comparative study of anomaly detection schemes in network intrusion detection. In SIAM International Conference on Data-Mining, 2003.
-
(2003)
SIAM International Conference on Data-Mining
-
-
Lazareyic, A.1
Ozgur, A.2
Ertoz, L.3
Srivastava, J.4
Kumar, V.5
|