-
1
-
-
85036927113
-
-
Bertsimas, D. and J. Sethuraman, 2000. Moment Problems and Semidefinite Optimization. In: Handbook of Semidefinite Programming. 27. Int. Ser. Oper. Res. Manage. Sci. Kluwer Acad. Publ., Boston, MA, 27: 469-509.
-
Bertsimas, D. and J. Sethuraman, 2000. Moment Problems and Semidefinite Optimization. In: Handbook of Semidefinite Programming. Vol. 27. Int. Ser. Oper. Res. Manage. Sci. Kluwer Acad. Publ., Boston, MA, 27: 469-509.
-
-
-
-
3
-
-
85036940886
-
-
Eskin, E., A. Arnold, M. Prerau, L. Portnoy and S. Stolfo, 2002. A Geometric Framework for Unsupervised Anomaly Detection Detecting. In: Intrusions in Unlabeled Data. Kluwer, Barbara, D. and S. Jajodia (Eds.). Applications of Data Mining in Computer Security.
-
Eskin, E., A. Arnold, M. Prerau, L. Portnoy and S. Stolfo, 2002. A Geometric Framework for Unsupervised Anomaly Detection Detecting. In: Intrusions in Unlabeled Data. Kluwer, Barbara, D. and S. Jajodia (Eds.). Applications of Data Mining in Computer Security.
-
-
-
-
4
-
-
0029716418
-
A Sense of Self for Unix Process
-
IEEE Comput. Soc. Press, Los Alamitos, CA, pp
-
Forrest, S., S.A. Hofmeyr, A. Somayaji and T.A. Longstaff, 1996. A Sense of Self for Unix Process, Proceeding of 1996. IEEE Symposium on Security and Privacy. IEEE Comput. Soc. Press, Los Alamitos, CA, pp: 120-128.
-
(1996)
Proceeding of 1996. IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
5
-
-
4143104359
-
Study and development of genetic algorithm
-
Genshe, C. and Z. Xinhai, 1994. Study and development of genetic algorithm. J. Inform. Control, 23: 215-221.
-
(1994)
J. Inform. Control
, vol.23
, pp. 215-221
-
-
Genshe, C.1
Xinhai, Z.2
-
6
-
-
84898982587
-
Minimax probability machine (A)
-
University of California, pp
-
Lanckriet, G.R.G., L.E. Ghaoui and C. Bhattacharyya et al., 2002. Minimax probability machine (A). Proceeding Advances in Neural Information Processing System (C), Berkeley: Department of EECS University of California, pp: 1-7.
-
(2002)
Proceeding Advances in Neural Information Processing System (C), Berkeley: Department of EECS
, pp. 1-7
-
-
Lanckriet, G.R.G.1
Ghaoui, L.E.2
Bhattacharyya, C.3
-
7
-
-
0034836392
-
Information-theoretic measures for anomaly detection (C)
-
Oakland, pp
-
Lee, Wenke and D. Xiang, 2001. Information-theoretic measures for anomaly detection (C). In: IEEE Symposium on Security and Privacy. Oakland, pp: 130-143.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 130-143
-
-
Lee, W.1
Xiang, D.2
-
8
-
-
0030646627
-
A multi-sexual genetic algorithm for multiobjective optimization
-
Lis, J. and A.E. Eliben, 1997. A multi-sexual genetic algorithm for multiobjective optimization. In: Proc. IEEE Int. Conf. Evol. Comput., pp: 59-64.
-
(1997)
Proc. IEEE Int. Conf. Evol. Comput
, pp. 59-64
-
-
Lis, J.1
Eliben, A.E.2
-
11
-
-
2942666805
-
Intrusion Detection Using Support Vector Machines
-
San Diego, pp
-
Mukkamala, S., G.I. Janoski and A.H. Sung, 2002. Intrusion Detection Using Support Vector Machines, Proceedings of the High Performance Computing Symposium-HPC, San Diego, pp: 178-183.
-
(2002)
Proceedings of the High Performance Computing Symposium-HPC
, pp. 178-183
-
-
Mukkamala, S.1
Janoski, G.I.2
Sung, A.H.3
-
12
-
-
0029253064
-
Refined genetic algorithm-economic dispatch example
-
Sheble, G.B. and K. Brittig, 1995. Refined genetic algorithm-economic dispatch example. IEEE Trans. Power Sys., 10: 117-124.
-
(1995)
IEEE Trans. Power Sys
, vol.10
, pp. 117-124
-
-
Sheble, G.B.1
Brittig, K.2
-
13
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
Staniford, S., J. Hoagland and J. McAlemey, 2002. Practical automated detection of stealthy portscans. J. Comp. Secu., 2002, 10: 105-136.
-
(2002)
J. Comp. Secu
, vol.2002
, Issue.10
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.2
McAlemey, J.3
-
14
-
-
41549146653
-
Parallel genetic algorithm
-
Yanfeng, S. and W. Zhongtuo, 1995. Parallel genetic algorithm. J. Syst. Eng., 13: 14-6.
-
(1995)
J. Syst. Eng
, vol.13
, pp. 14-16
-
-
Yanfeng, S.1
Zhongtuo, W.2
|