-
1
-
-
0031334221
-
Selection of relevant features and examples in machine learning
-
December
-
A Blum and P Langley, "Selection of relevant features and examples in machine learning", Artificial Intelligence, 97(1-2):245-271, December 1997
-
(1997)
Artificial Intelligence
, vol.97
, Issue.1-2
, pp. 245-271
-
-
Blum, A.1
Langley, P.2
-
3
-
-
0013326060
-
Feature Selection for Classification
-
M Dash and H Liu, "Feature Selection for Classification," Intelligent Data Analysis: An Int'l J., vol. 1, no. 3, pp 131-156, 1997
-
(1997)
Intelligent Data Analysis: An Int'l J
, vol.1
, Issue.3
, pp. 131-156
-
-
Dash, M.1
Liu, H.2
-
5
-
-
25844491810
-
An Intelligent Intrusion Detection System for Anomaly and Misuse Detection in Computer Networks
-
O Depren, M Topallar, E Anarim, and M K Ciliz "An Intelligent Intrusion Detection System for Anomaly and Misuse Detection in Computer Networks" Expert systems with Applications, 29:713-722, 2005.
-
(2005)
Expert systems with Applications
, vol.29
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Ciliz, M.K.4
-
6
-
-
63049115197
-
-
J Doak, An evaluation of feature selection methods and their application to computer security, Technical report, DavisCA: University of California, Department of Computer Science,1992
-
J Doak, "An evaluation of feature selection methods and their application to computer security", Technical report, DavisCA: University of California, Department of Computer Science,1992
-
-
-
-
8
-
-
77953759247
-
Decision tree classifier for network intrusion detection with GA based feature selection
-
Georgia
-
Gary Stein, Bing Chen, Annie S Wu, Kein A Hua, "Decision tree classifier for network intrusion detection with GA based feature selection", Proceedings of the 43rd ACM Annual Southeast Conference, Kennesaw, Georgia, Vol 2, 2005
-
(2005)
Proceedings of the 43rd ACM Annual Southeast Conference, Kennesaw
, vol.2
-
-
Stein, G.1
Chen, B.2
Wu, A.S.3
Hua, K.A.4
-
10
-
-
0029503525
-
-
H.Liu, Setiono and R., Chi2:feature selection and discretization of numeric attributes, in Proc of the Seventh International Conference on Tools with Artificial Intelligence, pp.388 - 391, 1995.
-
H.Liu, Setiono and R., "Chi2:feature selection and discretization of numeric attributes", in Proc of the Seventh International Conference on Tools with Artificial Intelligence, pp.388 - 391, 1995.
-
-
-
-
13
-
-
63049108044
-
-
KDDCUP 1999
-
KDDCUP 1999.
-
-
-
-
14
-
-
0027002164
-
The feature selection problem: Traditional methods and new algorithm
-
K Kira, and L. A. Rendell: 1992a, 'The feature selection problem: traditional methods and new algorithm'. In: Proceedings of AAAI'92
-
(1992)
Proceedings of AAAI'92
-
-
Kira, K.1
Rendell, L.A.2
-
15
-
-
0031381525
-
Wrapper for Feature Subset Selection
-
R Kohavi and G H John, "Wrapper for Feature Subset Selection", Artificial Intelligence, vol. 97, no. 1-2, pp. 273-324, 1997.
-
(1997)
Artificial Intelligence
, vol.97
, Issue.1-2
, pp. 273-324
-
-
Kohavi, R.1
John, G.H.2
-
17
-
-
0034455983
-
Adaptive intrusion detection: A Data Mining approach
-
W Lee, S. J. Stolfo, and K. W. Mok, "Adaptive intrusion detection: A Data Mining approach", Artificial Intelligence Review 14 (6), 533567, 2000
-
(2000)
Artificial Intelligence Review
, vol.14
, Issue.6
, pp. 533567
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
18
-
-
10244260290
-
Decision tree classifier for computer intrusion detection
-
Li, X., and Ye, N., "Decision tree classifier for computer intrusion detection.", Journal of Parallel and Distributed Computing Practices, 4(2), pp 179-190, 2001
-
(2001)
Journal of Parallel and Distributed Computing Practices
, vol.4
, Issue.2
, pp. 179-190
-
-
Li, X.1
Ye, N.2
-
19
-
-
0141990695
-
Theoretical and Empirical Analysis of ReliefF and RReliefF
-
Marko Robnik- Šikonja, Igor Kononenko, " Theoretical and Empirical Analysis of ReliefF and RReliefF", Machine Learning Journal (2003) 53:23-69
-
(2003)
Machine Learning Journal
, vol.53
, pp. 23-69
-
-
Robnik, M.1
Šikonja, I.K.2
-
20
-
-
34147099073
-
Survey of network based defense mechanism countering the DOS and DDOS problem
-
article, Apr
-
T Peng, C Leckie, K Ramamohana rao 2007, "Survey of network based defense mechanism countering the DOS and DDOS problem", ACM Computing surveys, vol 39, no1, article 3 (Apr 2007)
-
(2007)
ACM Computing surveys
, vol.39
, Issue.NO1
, pp. 3
-
-
Peng, T.1
Leckie, C.2
Ramamohana rao, K.3
-
22
-
-
0007473204
-
An Introduction to Intrusion Detection
-
April
-
A Sundaram, "An Introduction to Intrusion Detection", ACM Cross Roads, Vol. 2, No. 4, April 1996
-
(1996)
ACM Cross Roads
, vol.2
, Issue.4
-
-
Sundaram, A.1
-
23
-
-
0037105910
-
Intrusion Detection Techniques and Approaches
-
September
-
R Verwoerd and R Hunt, "Intrusion Detection Techniques and Approaches" Computer Communications, 25(15):1356-1365, September 2002
-
(2002)
Computer Communications
, vol.25
, Issue.15
, pp. 1356-1365
-
-
Verwoerd, R.1
Hunt, R.2
-
27
-
-
63049084921
-
-
W?odzis?aw, W. Tomasz, B. Jacek and K. Adam, Feature Selection and Ranking Filters, 2003,
-
W?odzis?aw, W. Tomasz, B. Jacek and K. Adam, "Feature Selection and Ranking Filters", 2003,
-
-
-
-
28
-
-
63049099339
-
-
Weka Machine Learning Project
-
"Weka Machine Learning Project".
-
-
-
|