메뉴 건너뛰기




Volumn 7, Issue 1, 2008, Pages 185-189

Minimax probability machine with genetic feature optimized for intrusion detection

Author keywords

Data classification; Genetic algorithms; Intrusion detection; MPM

Indexed keywords

FEATURE EXTRACTION; GENETIC ALGORITHMS; LEARNING SYSTEMS; PROBABILITY DISTRIBUTIONS;

EID: 41549095028     PISSN: 18125638     EISSN: 18125646     Source Type: Journal    
DOI: 10.3923/itj.2008.185.189     Document Type: Article
Times cited : (6)

References (14)
  • 1
    • 85036927113 scopus 로고    scopus 로고
    • Bertsimas, D. and J. Sethuraman, 2000. Moment Problems and Semidefinite Optimization. In: Handbook of Semidefinite Programming. 27. Int. Ser. Oper. Res. Manage. Sci. Kluwer Acad. Publ., Boston, MA, 27: 469-509.
    • Bertsimas, D. and J. Sethuraman, 2000. Moment Problems and Semidefinite Optimization. In: Handbook of Semidefinite Programming. Vol. 27. Int. Ser. Oper. Res. Manage. Sci. Kluwer Acad. Publ., Boston, MA, 27: 469-509.
  • 3
    • 85036940886 scopus 로고    scopus 로고
    • Eskin, E., A. Arnold, M. Prerau, L. Portnoy and S. Stolfo, 2002. A Geometric Framework for Unsupervised Anomaly Detection Detecting. In: Intrusions in Unlabeled Data. Kluwer, Barbara, D. and S. Jajodia (Eds.). Applications of Data Mining in Computer Security.
    • Eskin, E., A. Arnold, M. Prerau, L. Portnoy and S. Stolfo, 2002. A Geometric Framework for Unsupervised Anomaly Detection Detecting. In: Intrusions in Unlabeled Data. Kluwer, Barbara, D. and S. Jajodia (Eds.). Applications of Data Mining in Computer Security.
  • 5
    • 4143104359 scopus 로고
    • Study and development of genetic algorithm
    • Genshe, C. and Z. Xinhai, 1994. Study and development of genetic algorithm. J. Inform. Control, 23: 215-221.
    • (1994) J. Inform. Control , vol.23 , pp. 215-221
    • Genshe, C.1    Xinhai, Z.2
  • 7
    • 0034836392 scopus 로고    scopus 로고
    • Information-theoretic measures for anomaly detection (C)
    • Oakland, pp
    • Lee, Wenke and D. Xiang, 2001. Information-theoretic measures for anomaly detection (C). In: IEEE Symposium on Security and Privacy. Oakland, pp: 130-143.
    • (2001) IEEE Symposium on Security and Privacy , pp. 130-143
    • Lee, W.1    Xiang, D.2
  • 8
    • 0030646627 scopus 로고    scopus 로고
    • A multi-sexual genetic algorithm for multiobjective optimization
    • Lis, J. and A.E. Eliben, 1997. A multi-sexual genetic algorithm for multiobjective optimization. In: Proc. IEEE Int. Conf. Evol. Comput., pp: 59-64.
    • (1997) Proc. IEEE Int. Conf. Evol. Comput , pp. 59-64
    • Lis, J.1    Eliben, A.E.2
  • 12
    • 0029253064 scopus 로고
    • Refined genetic algorithm-economic dispatch example
    • Sheble, G.B. and K. Brittig, 1995. Refined genetic algorithm-economic dispatch example. IEEE Trans. Power Sys., 10: 117-124.
    • (1995) IEEE Trans. Power Sys , vol.10 , pp. 117-124
    • Sheble, G.B.1    Brittig, K.2
  • 13
    • 0036090327 scopus 로고    scopus 로고
    • Practical automated detection of stealthy portscans
    • Staniford, S., J. Hoagland and J. McAlemey, 2002. Practical automated detection of stealthy portscans. J. Comp. Secu., 2002, 10: 105-136.
    • (2002) J. Comp. Secu , vol.2002 , Issue.10 , pp. 105-136
    • Staniford, S.1    Hoagland, J.2    McAlemey, J.3
  • 14
    • 41549146653 scopus 로고
    • Parallel genetic algorithm
    • Yanfeng, S. and W. Zhongtuo, 1995. Parallel genetic algorithm. J. Syst. Eng., 13: 14-6.
    • (1995) J. Syst. Eng , vol.13 , pp. 14-16
    • Yanfeng, S.1    Zhongtuo, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.