-
2
-
-
0033293396
-
Towards a Taxonomy of Intrusion Detection Systems, IBM Technical Paper
-
April
-
Herv Debar, Marc Dacier, and Andreas Wespi, "Towards a Taxonomy of Intrusion Detection Systems", IBM Technical Paper, Computer Networks, Vol.39, Issue 9, pp. 805-822, April 1999.
-
(1999)
Computer Networks
, vol.39
, Issue.9
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
3
-
-
0038223829
-
-
NIST Special Publication on Intrusion Detection System, 31 November
-
R. Bace and P. Mell, "Intrusion Detection Systems", NIST Special Publication on Intrusion Detection System, 31 November 2001.
-
(2001)
Intrusion Detection Systems
-
-
Bace, R.1
Mell, P.2
-
6
-
-
0009956176
-
Machine Learning techniques for the computer Security
-
PhD thesis, Purdue University
-
T.Lane, "Machine Learning techniques for the computer Security", PhD thesis, Purdue University, 2000.
-
(2000)
-
-
Lane, T.1
-
7
-
-
34547568079
-
A new intrusion detection method based on discriminant analysis
-
May
-
Madori Asaka, Takefumi Onabuta, Tadashi Inoue, Shunji Okazawa, and Shigeki Goto, "A new intrusion detection method based on discriminant analysis", Oakland, pp.130-143, May 2001.
-
(2001)
Oakland
, pp. 130-143
-
-
Asaka, M.1
Onabuta, T.2
Inoue, T.3
Okazawa, S.4
Goto, S.5
-
8
-
-
6344223434
-
Using Statistical Analysis and Support Vector Machine Classification to Detection Complicated Attacks
-
Shanghai, China, August 26-29
-
Ming Tang, Song-Can Chen, Yi Zhuang and Jia Liu, "Using Statistical Analysis and Support Vector Machine Classification to Detection Complicated Attacks", Proc. Of the Third International Conference on Machine Learning and Cybernetics IEEE Computer Society, Shanghai, China, August 26-29, 2004.
-
(2004)
Proc. Of the Third International Conference on Machine Learning and Cybernetics IEEE Computer Society
-
-
Tang, M.1
Chen, S.-C.2
Zhuang, Y.3
Liu, J.4
-
9
-
-
0033636139
-
Support vector machine classification and validation of cancer tissue samples using microarray expression data
-
Furey, T.S., Cristianini, N., Duffy, N., Beddarski, K.W., Schummer, M. and Haussler, "Support vector machine classification and validation of cancer tissue samples using microarray expression data," Bioinformatics, vol. 16, pp.906-914, 2000.
-
(2000)
Bioinformatics
, vol.16
, pp. 906-914
-
-
Furey, T.S.1
Cristianini, N.2
Duffy, N.3
Beddarski, K.W.4
Schummer, M.5
Haussler6
-
10
-
-
0036161259
-
Gene selection for cancer classification using support vector machines
-
Guyon, I., Weston, J., Barnhill, S. and Vapnik, V., "Gene selection for cancer classification using support vector machines," Machine Learning, vol. 46, pp.389-422, 2002.
-
(2002)
Machine Learning
, vol.46
, pp. 389-422
-
-
Guyon, I.1
Weston, J.2
Barnhill, S.3
Vapnik, V.4
-
11
-
-
0038729565
-
Classification of multiple cancer types be multicategory support vector machines using gene expression data
-
Lee, Y. and Lee, C.-K., "Classification of multiple cancer types be multicategory support vector machines using gene expression data," Bioinformatics, vol. 18, pp. 1132-1139, 2003.
-
(2003)
Bioinformatics
, vol.18
, pp. 1132-1139
-
-
Lee, Y.1
Lee, C.-K.2
-
12
-
-
84888264031
-
Fearture Selection using PSO-SVM
-
Hong Kong
-
Chung-Jui Tu, Li-Yeh Chuang, Jun-Yang Chang, and Cheng-Hong Yang, "Fearture Selection using PSO-SVM", in Proc. International multiconf. Engineers and computer scientist, Hong Kong, 2006, pp.138-143.
-
(2006)
Proc. International multiconf. Engineers and computer scientist
, pp. 138-143
-
-
Tu, C.-J.1
Chuang, L.-Y.2
Chang, J.-Y.3
Yang, C.-H.4
-
14
-
-
54949108446
-
-
J. Twycross , Immune Systems, Danger Theory and Intrusion Detection, presented at the AISB 2004 Symposium on Immune System and Cognition, Leeds, U.K., March 2004.
-
J. Twycross , Immune Systems, "Danger Theory and Intrusion Detection", presented at the AISB 2004 Symposium on Immune System and Cognition, Leeds, U.K., March 2004.
-
-
-
-
15
-
-
33645961388
-
An artificial immune system for fuzzy-rule induction in data mining
-
R.T. Alves, M.R.B.S. Delgado, H.S. Lopes, A.A. Freitas, "An artificial immune system for fuzzy-rule induction in data mining", Lecture Notes in Computer Science, Berlin: Springer-Verlag,Vol.3242, 2004, pp.1011-1020
-
(2004)
Lecture Notes in Computer Science, Berlin: Springer-Verlag
, vol.3242
, pp. 1011-1020
-
-
Alves, R.T.1
Delgado, M.R.B.S.2
Lopes, H.S.3
Freitas, A.A.4
-
19
-
-
0031700696
-
A modified particle swarm optimizer. IEEE World Congress on Computational
-
Shi, Y., Eberhart, R.: A modified particle swarm optimizer. IEEE World Congress on Computational Intelligence, 1998. pp.69-73.
-
(1998)
Intelligence
, pp. 69-73
-
-
Shi, Y.1
Eberhart, R.2
-
20
-
-
84901421400
-
The Swarm and the Queen: Towards a Deterministic and Adaptive Particle Swarm Optimization
-
Clerc, M.: The Swarm and the Queen: Towards a Deterministic and Adaptive Particle Swarm Optimization. Proceeding of the Congress of Evolutionary Computation, Vol.3, 1999. pp. 1951-1957
-
(1999)
Proceeding of the Congress of Evolutionary Computation
, vol.3
, pp. 1951-1957
-
-
Clerc, M.1
-
21
-
-
84888264031
-
Feature Selection using PSO-SVM
-
Hong Kong
-
Chung-Jui Tu, Li-Yeh Chuang, Jun-Yang and Cheng-Hong Yang, "Feature Selection using PSO-SVM", in Proc. International Multiconference Engineers and Computer scientist, Hong Kong, 2006, pp.138-143.
-
(2006)
Proc. International Multiconference Engineers and Computer scientist
, pp. 138-143
-
-
Tu, C.-J.1
Li-Yeh Chuang, J.-Y.2
Yang, C.-H.3
-
22
-
-
0000897328
-
The Kernel-Adatron: A Fast and Simple Learning Procedure for Suuport Vector machines
-
Frieß, T., N. Cristianini, and C. Campbell, "The Kernel-Adatron: a Fast and Simple Learning Procedure for Suuport Vector machines," Proc. Of the Fifteenth Internaltional Conference on Machine Learning, pp. 188-196, 1998.
-
(1998)
Proc. Of the Fifteenth Internaltional Conference on Machine Learning
, pp. 188-196
-
-
Frieß, T.1
Cristianini, N.2
Campbell, C.3
-
23
-
-
84899013173
-
Support Vector regression Machines,
-
Moser, M, Jordan, M. and Petshe, T, ed, MIT Press, Cambridge, Ma, pp
-
Drucker, H., Burges, C., Kaufman, L., Smola, A. and Vapnik, "Support Vector regression Machines, " in Moser, M., Jordan, M. and Petshe, T. (ed.) Neural Information Processing Systems, Vol. 9. MIT Press, Cambridge, Ma, pp. 155-161. 1997.
-
(1997)
Neural Information Processing Systems
, vol.9
, pp. 155-161
-
-
Drucker, H.1
Burges, C.2
Kaufman, L.3
Smola, A.4
Vapnik5
-
25
-
-
13544269338
-
Application of SVM and ANN for intrusion, Computers & Operations Research
-
W.H. Chen, S.H. Hsu, and H.P. Shen, "Application of SVM and ANN for intrusion, Computers & Operations Research", ELSEVIER, Vol. 32, No.10, 2005, pp. 2617-2634.
-
(2005)
ELSEVIER
, vol.32
, Issue.10
, pp. 2617-2634
-
-
Chen, W.H.1
Hsu, S.H.2
Shen, H.P.3
-
26
-
-
1542284996
-
-
K.L. Li, H.K. Huang, S.F. Tian, and W. Xu, "Improving one-class SVM for anomaly detection, International Conference on Machine Learning and Cybernetics", Vol.5, 2003, pp. 3077-3081.
-
(2003)
Improving one-class SVM for anomaly detection, International Conference on Machine Learning and Cybernetics
, vol.5
, pp. 3077-3081
-
-
Li, K.L.1
Huang, H.K.2
Tian, S.F.3
Xu, W.4
-
28
-
-
33744522522
-
Intrusion Detection System Based on Multi-class SVM
-
H. Lee, J. Song, D. Park, "Intrusion Detection System Based on Multi-class SVM", RSFDGrC, Vol. 2, 2005, pp. 511-519.
-
(2005)
RSFDGrC
, vol.2
, pp. 511-519
-
-
Lee, H.1
Song, J.2
Park, D.3
-
29
-
-
54949135100
-
-
A. Abraham, R.Jain, Soft Computing Models for Network Intrusion Detection Systems CoRRcs, CR/0405046, 2004.
-
A. Abraham, R.Jain, "Soft Computing Models for Network Intrusion Detection Systems CoRRcs", CR/0405046, 2004.
-
-
-
-
31
-
-
54949114565
-
-
B. Schoelkopf, C. Burges, and V. Vapnik., Extracting support data for a given task. In U.M. Fayyad, and R. Uthurusamy, editors, Proceedings, First International Conference on Knowledge Discovery & Data Mining, AAAI Press, MenloPark, CA ,1995.
-
B. Schoelkopf, C. Burges, and V. Vapnik., "Extracting support data for a given task". In U.M. Fayyad, and R. Uthurusamy, editors, Proceedings, First International Conference on Knowledge Discovery & Data Mining, AAAI Press, MenloPark, CA ,1995.
-
-
-
-
32
-
-
54949116795
-
-
S. Knerrr, L. Personnaz, and G. Dreyfus, Single-layer Learning Revisited: a Stepwise Procedure for Building and Training a Neural Network, In J. Fogelman, editor, Neurocomputing: Algorithms, Architectures and Applications, Springer-Verlag, 1990.
-
S. Knerrr, L. Personnaz, and G. Dreyfus, "Single-layer Learning Revisited: a Stepwise Procedure for Building and Training a Neural Network", In J. Fogelman, editor, Neurocomputing: Algorithms, Architectures and Applications, Springer-Verlag, 1990.
-
-
-
-
33
-
-
24944586818
-
Network-Based Intrusion Detection with Support Vector Machines
-
D. S. Kim, J. S. Park, "Network-Based Intrusion Detection with Support Vector Machines", ICOIN, 2003, pp. 747-756.
-
(2003)
ICOIN
, pp. 747-756
-
-
Kim, D.S.1
Park, J.S.2
-
34
-
-
54949126603
-
-
KDD data set, 1999; http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html
-
(1999)
-
-
-
36
-
-
0003425664
-
Support Vector Machines for Classification and Regression,
-
Technical report
-
Steven R. Gunn, "Support Vector Machines for Classification and Regression," Technical report, 1998.
-
(1998)
-
-
Gunn, S.R.1
-
37
-
-
38049121550
-
To Identify Suspicious Activity in Anomaly Detection Based on Soft Computer
-
Innsbruck, Austria: IASTED
-
th IASTED Int. Multi-Conf. on APPLIED INFORMATICS. Innsbruck, Austria: IASTED, 2005, pp. 359-364.
-
(2005)
th IASTED Int. Multi-Conf. on APPLIED INFORMATICS
, pp. 359-364
-
-
Chimphlee, W.1
Sap, M.N.M.2
Abdullah, A.H.3
Chimphlee, S.4
Srinoy, S.5
-
38
-
-
19544384880
-
A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection
-
A. Lazarevic, A. Ozgur, L. Ertoz, J. Srivastava, and V. Kumar, "A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection". In SIAM International Conference on Data Mining, 2003.
-
(2003)
SIAM International Conference on Data Mining
-
-
Lazarevic, A.1
Ozgur, A.2
Ertoz, L.3
Srivastava, J.4
Kumar, V.5
|