-
2
-
-
0026860706
-
Methods of combining multiple classifiers and their applications to handwriting recognition
-
(May)
-
Xu L., Krzyzak A., and Suen C.Y. Methods of combining multiple classifiers and their applications to handwriting recognition. IEEE Transactions on Systems, Man, and Cybernetics 22 3 (1992) 418-435 (May)
-
(1992)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.22
, Issue.3
, pp. 418-435
-
-
Xu, L.1
Krzyzak, A.2
Suen, C.Y.3
-
4
-
-
33746791981
-
On the impact of fusion strategies on classification errors for large ensembles of classifiers
-
(November)
-
Cabrera J.B.D. On the impact of fusion strategies on classification errors for large ensembles of classifiers. Pattern Recognition 39 11 (2006) 1963-1978 (November)
-
(2006)
Pattern Recognition
, vol.39
, Issue.11
, pp. 1963-1978
-
-
Cabrera, J.B.D.1
-
5
-
-
84885579157
-
-
Oza N.C., Polikar R., Kittler J., and Roli F. (Eds), Springer Verlag (June)
-
In: Oza N.C., Polikar R., Kittler J., and Roli F. (Eds). Multiple Classifier Systems, 6th International Workshop, Seaside, CA. Lecture Notes in Computer Science vol. 3541 (2005), Springer Verlag (June)
-
(2005)
Lecture Notes in Computer Science
, vol.3541
-
-
-
6
-
-
0032021555
-
On combining classifiers
-
Kittler J., Hatef M., Duin R.P.W., and Matas J. On combining classifiers. IEEE Transactions on Pattern Analysis and Machine Intelligence 20 3 (1998) 226-239
-
(1998)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.20
, Issue.3
, pp. 226-239
-
-
Kittler, J.1
Hatef, M.2
Duin, R.P.W.3
Matas, J.4
-
8
-
-
35348884670
-
-
D.M.J. Tax. One-class classification. Ph.D. thesis. Delft University of Technology, Delft, Holland, 2001 (June).
-
-
-
-
9
-
-
84964411176
-
-
W. Lee, S. Stolfo, P. Chan, E. Eskin, W. Fan, M. Miller, S. Hershkop, J. Zhang, Real Time Data Mining-based Intrusion Detection, in: Proceedings of The 2001 DARPA Information Survivability Conference and Exposition (DISCEX II), Anaheim, CA, 2001 (June).
-
-
-
-
10
-
-
35348867246
-
-
L. Didaci, G. Giacinto, F. Roli, Ensemble Learning for Intrusion Detection in Computer Networks, in: Proceedings of the 8th Conference of the Italian Association of Artificial Intelligence (AIAA), Siena, Italy, 2002 (September).
-
-
-
-
11
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
(June)
-
Chebrolu S., Abraham A., and Thomas J.P. Feature deduction and ensemble design of intrusion detection systems. Computers and Security 24 4 (2005) 295-307 (June)
-
(2005)
Computers and Security
, vol.24
, Issue.4
, pp. 295-307
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
12
-
-
85177498770
-
-
Y. Zhang, W. Lee, Intrusion Detection in Wireless Ad-Hoc Networks, in: Proceedings of the 6th International Conference on Mobile Computing and Networking, 2000 (August).
-
-
-
-
13
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
(September)
-
Zhang Y., Lee W., and Huang Y.-A. Intrusion detection techniques for mobile wireless networks. Wireless Networks 9 5 (2003) 545-556 (September)
-
(2003)
Wireless Networks
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.-A.3
-
14
-
-
4544258840
-
-
Y.-A. Huang, W. Lee, A Cooperative intrusion detection system for ad hoc networks, in: ACM Workshop on Security of Ad Hoc and Sensor Network (SASN'03), Fairfax, VA, 2003 (October).
-
-
-
-
17
-
-
35348819182
-
-
J. Voorhees, The Limits on Wireless Security: 802.11 in early 2002, SANS Institute, January 30, 2002; available at http://rr.sans.org/wireless/limits.php.
-
-
-
-
18
-
-
0033357103
-
Securing ad hoc networks
-
Zhou L., and Haas Z.J. Securing ad hoc networks. IEEE Network November (1999) 24-30
-
(1999)
IEEE Network
, Issue.November
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
19
-
-
0033712953
-
Statistical traffic modeling for network intrusion detection
-
IEEE Computer Society, San Francisco, CA (August)
-
Cabrera J.B.D., Ravichandran B., and Mehra R.K. Statistical traffic modeling for network intrusion detection. Proceedings of the Eighth International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems (2000), IEEE Computer Society, San Francisco, CA 466-473 (August)
-
(2000)
Proceedings of the Eighth International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
, pp. 466-473
-
-
Cabrera, J.B.D.1
Ravichandran, B.2
Mehra, R.K.3
-
21
-
-
0026154682
-
-
H.S. Javitz, A. Valdes, SRI IDES Statistical Anomaly Detector, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, 1991.
-
-
-
-
22
-
-
0003714340
-
-
Schneider F.B. (Ed), National Academy Press
-
In: Schneider F.B. (Ed). Trust in Cyberspace (1998), National Academy Press
-
(1998)
Trust in Cyberspace
-
-
-
24
-
-
0142063407
-
Novelty detection: A review. Part I: Statistical approaches; Part II: Neural network based approaches
-
(December)
-
Markou M., and Singh S. Novelty detection: A review. Part I: Statistical approaches; Part II: Neural network based approaches. Signal Processing 83 12 (2003) 2481-2521 (December)
-
(2003)
Signal Processing
, vol.83
, Issue.12
, pp. 2481-2521
-
-
Markou, M.1
Singh, S.2
-
25
-
-
0010142578
-
One-class classifier networks for target recognition applications
-
International Neural Network Society, Portland, OR
-
Moya M., Koch M., and Hostetler L. One-class classifier networks for target recognition applications. Proceedings of the World Congress on Neural Networks (1993), International Neural Network Society, Portland, OR 797-801
-
(1993)
Proceedings of the World Congress on Neural Networks
, pp. 797-801
-
-
Moya, M.1
Koch, M.2
Hostetler, L.3
-
26
-
-
0031169206
-
Outliers in statistical pattern recognition and an application to automatic chromosome classification
-
Ritter G., and Gallegos M. Outliers in statistical pattern recognition and an application to automatic chromosome classification. Pattern Recognition Letters 18 (1997) 525-539
-
(1997)
Pattern Recognition Letters
, vol.18
, pp. 525-539
-
-
Ritter, G.1
Gallegos, M.2
-
27
-
-
35348900570
-
-
N. Japkowicz, Concept-Learning in the absence of counterexamples: an autoassociation-based approach to classification, Ph.D. thesis. Rutgers, The State University of New Jersey, New Brunswick, NJ, 1999.
-
-
-
-
28
-
-
0033713738
-
Combining multiple classifiers by averaging or multiplying?
-
(September)
-
Tax D.M.J., van Breukelen M., Duin R.P.W., and Kittler J. Combining multiple classifiers by averaging or multiplying?. Pattern Recognition 33 9 (2000) 1475-1485 (September)
-
(2000)
Pattern Recognition
, vol.33
, Issue.9
, pp. 1475-1485
-
-
Tax, D.M.J.1
van Breukelen, M.2
Duin, R.P.W.3
Kittler, J.4
-
30
-
-
0037629724
-
-
Y.-A. Huang, W. Fan, W. Lee, P.S. Yu, Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies, in: Proceedings of the 23th International Conference on Distributed Computing Systems, Providence, RI, 2003 (May).
-
-
-
-
31
-
-
0001562581
-
Linear and Order Statistics Combiners for Pattern Classification
-
Sharkey A. (Ed), Springer Verlag
-
Tumer K., and Ghosh J. Linear and Order Statistics Combiners for Pattern Classification. In: Sharkey A. (Ed). Combining Artificial Neural Networks (1999), Springer Verlag 127-162
-
(1999)
Combining Artificial Neural Networks
, pp. 127-162
-
-
Tumer, K.1
Ghosh, J.2
-
32
-
-
0035368916
-
An asymptotic analysis of some expert fusion methods
-
Chen D., and Cheng X. An asymptotic analysis of some expert fusion methods. Pattern Recognition Letters 22 (2001) 901-904
-
(2001)
Pattern Recognition Letters
, vol.22
, pp. 901-904
-
-
Chen, D.1
Cheng, X.2
-
35
-
-
0013173138
-
Comparison between product and mean classifier combination rules
-
Pudil P., Novovicova J., and Grim J. (Eds), Institute of Information Theory and Automation (June)
-
Tax D.M.J., Duin R.P.W., and van Breukelen M. Comparison between product and mean classifier combination rules. In: Pudil P., Novovicova J., and Grim J. (Eds). First International Workshop on Statistical Techniques in Pattern Recognition (1997), Institute of Information Theory and Automation 165-170 (June)
-
(1997)
First International Workshop on Statistical Techniques in Pattern Recognition
, pp. 165-170
-
-
Tax, D.M.J.1
Duin, R.P.W.2
van Breukelen, M.3
-
36
-
-
35348872382
-
-
L. Breiman, Probability, Society for Industrial and Applied Mathematics, Philadelphia, PA, 1992. Unabridged, corrected republication of the work first published by Addison-Wesley Publishing Company, Inc., Reading, MA, 1968.
-
-
-
-
38
-
-
84962260018
-
-
R.P. Lippmann, D. Fried, I. Graf, J.W. Haines, K.R. Kendall, D. McClung, D. Weber, S.E. Webster, D. Wyschogrod, R.K. Cunningham, M. Zissmann, Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation, in: Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, vol. 2, 2000.
-
-
-
-
39
-
-
35348828338
-
-
W. Fan, W. Lee, S.J. Stolfo, M. Miller, A multiple-model cost-sensitive approach for intrusion detection, in: Proceedings of the Eleventh European Conference on Machine Learning, 2000.
-
-
-
-
40
-
-
35348869057
-
-
W. Fan, Cost-sensitive, Scalable and Adaptive Learning Using Ensemble-based Methods, Ph.D. thesis. Columbia University, New York, NY, February 2001.
-
-
-
-
41
-
-
0038330235
-
Fusion of multiple classifiers for intrusion detection in computer networks
-
Giacinto G., Roli F., and Didaci L. Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognition Letters 24 12 (2003) 1795-1803
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.12
, pp. 1795-1803
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
42
-
-
84943383590
-
-
A.H. Sung, S. Mukkamala, Identifying important features for intrusion detection using support vector machines and neural networks, in: Proceedings of International Symposium on Applications and the Internet (SAINT 2003), 2003.
-
-
-
-
43
-
-
84957038175
-
Combining One-Class Classifiers
-
Multiple Classifier Systems, 2nd International Workshop. Kittler J., and Roli F. (Eds), Springer Verlag, Cambridge, UK (July)
-
Tax D.M.J., and Duin R.P.W. Combining One-Class Classifiers. In: Kittler J., and Roli F. (Eds). Multiple Classifier Systems, 2nd International Workshop. Lecture Notes in Computer Science vol. 2096 (2001), Springer Verlag, Cambridge, UK 299-308 (July)
-
(2001)
Lecture Notes in Computer Science
, vol.2096
, pp. 299-308
-
-
Tax, D.M.J.1
Duin, R.P.W.2
-
44
-
-
0031191630
-
The use of the area under the ROC curve in the evaluation of machine learning algorithms
-
Bradley A.P. The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognition 30 7 (1997) 1145-1159
-
(1997)
Pattern Recognition
, vol.30
, Issue.7
, pp. 1145-1159
-
-
Bradley, A.P.1
-
45
-
-
84947596279
-
On Combining One-Class Classifiers for Image Database Retrieval
-
Multiple Classifier Systems, 3rd International Workshop. Roli F., and Kittler J. (Eds), Springer Verlag, Cagliari, Italy (June)
-
Lai C., Tax D.M.J., Duin R.P.W., Pekalska E., and Paclik P. On Combining One-Class Classifiers for Image Database Retrieval. In: Roli F., and Kittler J. (Eds). Multiple Classifier Systems, 3rd International Workshop. Lecture Notes in Computer Science vol. 2364 (2002), Springer Verlag, Cagliari, Italy 212-221 (June)
-
(2002)
Lecture Notes in Computer Science
, vol.2364
, pp. 212-221
-
-
Lai, C.1
Tax, D.M.J.2
Duin, R.P.W.3
Pekalska, E.4
Paclik, P.5
-
46
-
-
35048859747
-
Combining One-Class Classifiers to Classify Missing Data
-
Multiple Classifier Systems, 5th International Workshop. Roli F., Kittler J., and Windeatt T. (Eds), Springer Verlag, Cagliari, Italy (June)
-
Juszczak P., and Duin R.P.W. Combining One-Class Classifiers to Classify Missing Data. In: Roli F., Kittler J., and Windeatt T. (Eds). Multiple Classifier Systems, 5th International Workshop. Lecture Notes in Computer Science vol. 3077 (2004), Springer Verlag, Cagliari, Italy 92-101 (June)
-
(2004)
Lecture Notes in Computer Science
, vol.3077
, pp. 92-101
-
-
Juszczak, P.1
Duin, R.P.W.2
-
47
-
-
0036709275
-
Constructing boosting algorithms from SVMs: An application to one-class classification
-
(September)
-
Rätsch G., Mika S., Schölkopf B., and Müller K.-R. Constructing boosting algorithms from SVMs: An application to one-class classification. IEEE Transactions on Pattern Analysis and Machine Intelligence 24 9 (2002) 1184-1199 (September)
-
(2002)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.24
, Issue.9
, pp. 1184-1199
-
-
Rätsch, G.1
Mika, S.2
Schölkopf, B.3
Müller, K.-R.4
-
48
-
-
28444479158
-
-
H.-H. Tong, C.-R. Li, J.-R. He, Q.-A. Tran, H.-X. Duan, X. Li, A Novel Boosting-Based Anomaly Detection Scheme, in: Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, China, August 2005.
-
-
-
-
49
-
-
32344440279
-
-
A. Lazarevic, V. Kumar, Feature Bagging for Outlier Detection, in: Proceedings of the Eleventh International Conference on Knowledge Discovery and Data Mining (KDD'2005), Chicago, IL, 2005 (August).
-
-
-
-
50
-
-
0142222738
-
-
J.B.D. Cabrera, L. Lewis, R.K. Mehra, Detection and Classification of Intrusions and Faults using Sequences of System Calls, ACM SIGMOD Record Special Issue on Data Mining for Intrusion Detection, Security and Threat Analysis 30(4) (2001) 25-34 (December).
-
-
-
-
51
-
-
33745149379
-
Network Intrusion Detection by combining One-class Classifiers
-
Proceedings of the 13th International Conference on Image Analysis and Processing (ICIAP 2005). Roli F., and Vitulano S. (Eds), Springer Verlag, Cagliari, Italy (September)
-
Giacinto G., Perdisci R., and Roli F. Network Intrusion Detection by combining One-class Classifiers. In: Roli F., and Vitulano S. (Eds). Proceedings of the 13th International Conference on Image Analysis and Processing (ICIAP 2005). Lecture Notes in Computer Science vol. 3617 (2005), Springer Verlag, Cagliari, Italy (September)
-
(2005)
Lecture Notes in Computer Science
, vol.3617
-
-
Giacinto, G.1
Perdisci, R.2
Roli, F.3
-
52
-
-
33847372974
-
-
J.B.D. Cabrera, C. Gutiérrez, R.K. Mehra, Infrastructures and Algorithms for Distributed Anomaly-Based Intrusion Detection in Mobile Ad-Hoc Networks, in: Proceedings of the IEEE Military Communications Conference (IEEE MILCOM 2005), Atlantic City, NJ, October 2005.
-
-
-
-
53
-
-
0003802343
-
-
Chapman and Hall, New York
-
Breiman L., Friedman J.H., Olshen R.A., and Stone C.J. Classification and Regression Trees (1984), Chapman and Hall, New York
-
(1984)
Classification and Regression Trees
-
-
Breiman, L.1
Friedman, J.H.2
Olshen, R.A.3
Stone, C.J.4
-
55
-
-
1542285202
-
-
Z.-S. Pang, S.C. Chen, G.B. Hu, D.Q. Zhang, Hybrid neural network and C4.5 for misuse detection, in: Proceedings of the 2003 IEEE International Conference on Machine Learning and Cybernetics, 2003, pp. 2463-2467 (November).
-
-
-
-
56
-
-
33745463455
-
-
D.K. Kang, D. Fuller, V. Honavar, Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation, in: Proceedings of the 6th IEEE Information Assurance Workshop, West Point, NY, 2005, pp. 118-125 (June).
-
-
-
-
57
-
-
35348856715
-
-
W. Cohen, Fast effective rule induction, in: Proceedings of the Twelfth International Conference on Machine Learning, 1995.
-
-
-
-
58
-
-
35348818387
-
-
C. Borgelt, A Naive Bayes Classifier Plug-In for DataEngine, in: Proceedings of the Third Data Analysis Symposium, Aachen, Germany, 1999, pp. 87-90.
-
-
-
-
59
-
-
35348887595
-
-
S. McCanne and S. Floyd. The Network Simulator - ns-2; available at: http://www.isi.edu/nsnam/ns.
-
-
-
-
60
-
-
34347349933
-
-
C.E. Perkins and E.M. Royer, Ad hoc On Demand Distance Vector Routing, in: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, February 1999, pp. 90-100.
-
-
-
-
61
-
-
35348880156
-
-
P. Jacquet, P. Muhlethaler, A. Qayyum, Optimized Link-State Routing Protocol (draft-ietf-manet-olsr-00.txt), Technical report, MANET IETF drafts, November 1998, available at http://www.ietf.org/proceedings/99mar/I-D/draft-ietf-manet-olsr-00.txt.
-
-
-
-
62
-
-
84903836776
-
-
P. Ning, K. Sun, How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols, in: Information Assurance Workshop, 2003, IEEE Systems, Man and Cybernetics Society, West Point, New York, 2003.
-
-
-
-
63
-
-
35348917021
-
-
D. Dhillon, T.S. Randhawa, M. Wang, L. Lamont, Implementing a Fully Distributed Certificate Authority in an OLSR MANET, available at: http://www.crc.ca/fr/html/manetsensor/home/publications/WCNC2004.pdf.
-
-
-
-
64
-
-
0038675868
-
A survey of mobility models for ad hoc network research
-
Camp T., Boleng J., and Davies V. A survey of mobility models for ad hoc network research. Wireless Communications and Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications 2 5 (2002) 483-502
-
(2002)
Wireless Communications and Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications
, vol.2
, Issue.5
, pp. 483-502
-
-
Camp, T.1
Boleng, J.2
Davies, V.3
-
65
-
-
35348903009
-
-
Mobile Ad Hoc Networks for the Military, Cisco Systems, Inc., White Paper GDSG-APAC-MANET ver 3.0, 2003.
-
-
-
-
66
-
-
21244501361
-
A theoretical and experimental analysis of linear combiners for multiple classifier systems
-
(June)
-
Fumera G., and Roli F. A theoretical and experimental analysis of linear combiners for multiple classifier systems. IEEE Transactions on Pattern Analysis and Machine Intelligence 27 6 (2005) 942-956 (June)
-
(2005)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.27
, Issue.6
, pp. 942-956
-
-
Fumera, G.1
Roli, F.2
-
67
-
-
0030365938
-
Error correlation and error reduction in ensemble classifiers
-
Tumer K., and Ghosh J. Error correlation and error reduction in ensemble classifiers. Connection Science 8 3/4 (1996) 385-404
-
(1996)
Connection Science
, vol.8
, Issue.3-4
, pp. 385-404
-
-
Tumer, K.1
Ghosh, J.2
|