-
2
-
-
0037174204
-
Prediction algorithms and confidence measure based on algorithmic randomness theory
-
Gammerman A., and Vovk V. Prediction algorithms and confidence measure based on algorithmic randomness theory. Theoretical Computer Science (2002) 209-217
-
(2002)
Theoretical Computer Science
, pp. 209-217
-
-
Gammerman, A.1
Vovk, V.2
-
4
-
-
52149120844
-
-
K. Proedru, I. Nouretdinov, V. Vovk, A. Gammerman, Transductive confidence machine for pattern recognition, in: Proc. 13th European Conference on Machine Learning, 2002, pp. 381-390.
-
K. Proedru, I. Nouretdinov, V. Vovk, A. Gammerman, Transductive confidence machine for pattern recognition, in: Proc. 13th European Conference on Machine Learning, 2002, pp. 381-390.
-
-
-
-
5
-
-
33749568055
-
-
B. Daniel, D. Carlotta, P.R. James, Detecting outliers using transduction and statistical testing, in: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, USA, 2006, pp. 55-64.
-
B. Daniel, D. Carlotta, P.R. James, Detecting outliers using transduction and statistical testing, in: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, USA, 2006, pp. 55-64.
-
-
-
-
6
-
-
34548651677
-
-
Y. Li, B.X. Fang, L. Guo, Y. Chen, Network anomaly detection based on TCM-KNN algorithm, in: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS' 2007), ACM, 2007, pp. 13-19.
-
Y. Li, B.X. Fang, L. Guo, Y. Chen, Network anomaly detection based on TCM-KNN algorithm, in: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS' 2007), ACM, 2007, pp. 13-19.
-
-
-
-
7
-
-
34547470656
-
-
J. Mirkovic, P. Reiher, S. Fahmy, R. Thomas, A. Hussian, S. Schwab, C. Ko, Measuring Denial of Service, QoP'06, ACM, 2006, pp. 53-58.
-
J. Mirkovic, P. Reiher, S. Fahmy, R. Thomas, A. Hussian, S. Schwab, C. Ko, Measuring Denial of Service, QoP'06, ACM, 2006, pp. 53-58.
-
-
-
-
8
-
-
55049095581
-
-
J. Ash, M. Dolly, C. Dvorak, A. Morton, P. Taraporte, Y.E. Mghazli, Y.1541-QOSM - Y.1541 QoS Model for Networks Using Y.1541 QoS Classes, NSIS Working Group, Internet Draft, May 2006 (Work in progress).
-
J. Ash, M. Dolly, C. Dvorak, A. Morton, P. Taraporte, Y.E. Mghazli, Y.1541-QOSM - Y.1541 QoS Model for Networks Using Y.1541 QoS Classes, NSIS Working Group, Internet Draft, May 2006 (Work in progress).
-
-
-
-
9
-
-
77954449451
-
-
T. Beigbeder, R. Coughlan, C. Lusher, J. Plunkett, E. Agu, M. Claypool, The effects of loss and latency on user performance in unreal tournament 2003, in: Proceedings of ACM Network and System Support for Games Workshop (NetGames), September 2004.
-
T. Beigbeder, R. Coughlan, C. Lusher, J. Plunkett, E. Agu, M. Claypool, The effects of loss and latency on user performance in unreal tournament 2003, in: Proceedings of ACM Network and System Support for Games Workshop (NetGames), September 2004.
-
-
-
-
10
-
-
55049130515
-
-
Laetitia Jourdan, Clarisse Dhaenens, El-Ghazali Talbi, A Genetic algorithm for feature selection in data-mining for genetics, in: Proceedings of the 4th Metaheuristics International Conference, 2001, pp. 29-33.
-
Laetitia Jourdan, Clarisse Dhaenens, El-Ghazali Talbi, A Genetic algorithm for feature selection in data-mining for genetics, in: Proceedings of the 4th Metaheuristics International Conference, 2001, pp. 29-33.
-
-
-
-
11
-
-
0347763609
-
-
Jose Ramon Cano, Francisco Herrera, Manuel Lozano, Using evolutionary algorithms as instance selection for data reduction in KDD: an experimental study, IEEE Transactions on Evolutionary Computation, 2006, pp. 561-575.
-
Jose Ramon Cano, Francisco Herrera, Manuel Lozano, Using evolutionary algorithms as instance selection for data reduction in KDD: an experimental study, IEEE Transactions on Evolutionary Computation, 2006, pp. 561-575.
-
-
-
-
12
-
-
85084163349
-
-
W. Lee, S.J. Stolfo, Data mining approaches for intrusion detection, in: Proceedings of the 1998 USENIX Security Symposium, 1998.
-
W. Lee, S.J. Stolfo, Data mining approaches for intrusion detection, in: Proceedings of the 1998 USENIX Security Symposium, 1998.
-
-
-
-
13
-
-
85084160308
-
-
A. Ghosh, A. Schwartzbard, A study in using neural networks for anomaly and misuse detection, in: Proceedings of the 8th USENIX Security Symposium, 1999.
-
A. Ghosh, A. Schwartzbard, A study in using neural networks for anomaly and misuse detection, in: Proceedings of the 8th USENIX Security Symposium, 1999.
-
-
-
-
14
-
-
0242456801
-
-
M. Mahoney, P. Chan, Learning nonstationary models of normal network traffic for detecting novel attacks, in: Proceeding of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Canada, 2002, pp. 376-385.
-
M. Mahoney, P. Chan, Learning nonstationary models of normal network traffic for detecting novel attacks, in: Proceeding of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Canada, 2002, pp. 376-385.
-
-
-
-
15
-
-
0038324535
-
-
Kluwer
-
Eskin E., Arnold A., Prerau M., Portnoy L., and Stolfo S. A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data. Applications of Data Mining in Computer Security (2002), Kluwer
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
16
-
-
0036343692
-
-
Haining Wang et al., Detecting SYN flooding attacks, in: IEEE Infocom'2002, pp. 1530-1539.
-
Haining Wang et al., Detecting SYN flooding attacks, in: IEEE Infocom'2002, pp. 1530-1539.
-
-
-
-
17
-
-
55049118146
-
-
T. Peng et al., Protection from distributed denial of service attack using history-based ip filtering, in: IEEE ICC 2003.
-
T. Peng et al., Protection from distributed denial of service attack using history-based ip filtering, in: IEEE ICC 2003.
-
-
-
-
18
-
-
55049142498
-
-
D. Dittrich, The stacheldraht distributed denial of service attack tool. Available from: .
-
D. Dittrich, The stacheldraht distributed denial of service attack tool. Available from: .
-
-
-
-
19
-
-
55049108644
-
-
J. Barlow, W. Thrower, TFN2K - an analysis. Available from: .
-
J. Barlow, W. Thrower, TFN2K - an analysis. Available from: .
-
-
-
-
20
-
-
33947503628
-
Defense against spoofed IP traffic using hop-counter filtering
-
Wang H., Jin C., and Shin K.G. Defense against spoofed IP traffic using hop-counter filtering. IEEE/ACM Transactions on Networking 15 1 (2007) 40-53
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.1
, pp. 40-53
-
-
Wang, H.1
Jin, C.2
Shin, K.G.3
-
21
-
-
15544363902
-
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
-
Yau D., Lui J., Liang F., and Yang Y. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. IEEE/ACM Transactions on Networking 13 1 (2005) 29-42
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.1
, pp. 29-42
-
-
Yau, D.1
Lui, J.2
Liang, F.3
Yang, Y.4
-
22
-
-
55049119508
-
-
W. Li, Using genetic algorithm for network intrusion detection, C.S.G. Department of Energy, 2002, pp. 1-8.
-
W. Li, Using genetic algorithm for network intrusion detection, C.S.G. Department of Energy, 2002, pp. 1-8.
-
-
-
-
24
-
-
55049109545
-
-
F. Pernkopf, P.O. Leary, A Genetic algorithm for feature selection in data-mining for genetics, in: Proc. of 4th Metaheuristics International Conference, 2001, pp. 29-33.
-
F. Pernkopf, P.O. Leary, A Genetic algorithm for feature selection in data-mining for genetics, in: Proc. of 4th Metaheuristics International Conference, 2001, pp. 29-33.
-
-
-
-
25
-
-
36549085110
-
An active learning based TCM-KNN algorithm for supervised network intrusion detection
-
Li Y., and Guo L. An active learning based TCM-KNN algorithm for supervised network intrusion detection. Computers & Security 26 7-8 (2007) 459-467
-
(2007)
Computers & Security
, vol.26
, Issue.7-8
, pp. 459-467
-
-
Li, Y.1
Guo, L.2
|