-
1
-
-
84969506768
-
Applications of hidden Markov models to detect multi-stage network attacks
-
D. Ourston, S. Matzner,W. Stump, and B. Hopkins, "Applications of hidden Markov models to detect multi-stage network attacks," Proc. 36th Hawaii Int. Conf. on System Sciences, p.334, 2003.
-
(2003)
Proc. 36th Hawaii Int. Conf. on System Sciences
, pp. 334
-
-
Ourston, D.1
Matzner, S.2
Stump, W.3
Hopkins, B.4
-
2
-
-
85065703189
-
Correlation-based feature selection for discrete and numeric class machine learning
-
M.A. Hall, "Correlation-based feature selection for discrete and numeric class machine learning," Proc. 17th Int'l Conf. on Machine Learning, pp.359-366, 2000.
-
(2000)
Proc. 17th Int'l Conf. on Machine Learning
, pp. 359-366
-
-
Hall, M.A.1
-
3
-
-
84942785917
-
Consistency based feature selection
-
Kyoto, Japan
-
M. Dash, H. Liu, and H. Motoda, "Consistency based feature selection," Proc. Fourth Pacific Asia Conf. on Knowledge Discovery and Data Mining (PAKDD), pp.98-109, Kyoto, Japan, 2000.
-
(2000)
Proc. Fourth Pacific Asia Conf. on Knowledge Discovery and Data Mining (PAKDD)
, pp. 98-109
-
-
Dash, M.1
Liu, H.2
Motoda, H.3
-
4
-
-
0028496468
-
Learning Boolean concepts in the presence of many irrelevant features
-
H. Almuallim and T.G. Dietterich, "Learning Boolean concepts in the presence of many irrelevant features," Artif. Intell., vol.69, nos.1-2, pp.279-305, 1994.
-
(1994)
Artif. Intell
, vol.69
, Issue.1-2
, pp. 279-305
-
-
Almuallim, H.1
Dietterich, T.G.2
-
6
-
-
84958740656
-
Anomaly detection enhanced classification in computer intrusion detection
-
Springer-Verlag, Berlin Heidelberg
-
M. Fugate and J.R. Gattiker, "Anomaly detection enhanced classification in computer intrusion detection," Lecture Notes in Computer Science, vol.2388, Springer-Verlag, Berlin Heidelberg, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2388
-
-
Fugate, M.1
Gattiker, J.R.2
-
8
-
-
24944563451
-
Robust support vector machines for anomaly detection in computer security
-
CSREA Press
-
W. Hu, Y. Liao, and V. Vemuri, "Robust support vector machines for anomaly detection in computer security," Proc. Int. Conf. on Machine Learning and Applications 2003, pp.168-174, CSREA Press, 2003.
-
(2003)
Proc. Int. Conf. on Machine Learning and Applications
, pp. 168-174
-
-
Hu, W.1
Liao, Y.2
Vemuri, V.3
-
9
-
-
85027124166
-
-
J. Cannady, Artificial neural network for misuse detection, Proc. 1998 National Information System Security Conf., pp.443-456, Arlington, Oct. 1998.
-
J. Cannady, "Artificial neural network for misuse detection," Proc. 1998 National Information System Security Conf., pp.443-456, Arlington, Oct. 1998.
-
-
-
-
10
-
-
0036161011
-
Choosing multiple parameters for support vector machines
-
O. Chapelle, V. Vapnik, O. Bousquet, and S. Mukherjee, "Choosing multiple parameters for support vector machines," Machine Learning Journal, vol.46, pp.131-159, 2002.
-
(2002)
Machine Learning Journal
, vol.46
, pp. 131-159
-
-
Chapelle, O.1
Vapnik, V.2
Bousquet, O.3
Mukherjee, S.4
-
11
-
-
0037382208
-
Evaluation of simple performance measures for tuning SVM hyperparameters
-
K. Duan, S.S. Keerthi, and A.N. Poo, "Evaluation of simple performance measures for tuning SVM hyperparameters," Neurocomputing, vol.51, pp.41-59, 2003.
-
(2003)
Neurocomputing
, vol.51
, pp. 41-59
-
-
Duan, K.1
Keerthi, S.S.2
Poo, A.N.3
-
12
-
-
85027161029
-
-
KDD Cup 1999 Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html
-
(1999)
Data
-
-
-
13
-
-
85027102405
-
-
Open SourceWEKA Project
-
Open SourceWEKA Project, http://www.cs.waikato.ac.nz/ml/weka/index.html
-
-
-
-
14
-
-
17044405923
-
Toward integrating feature selection algorithms for classification and clustering
-
H. Liu and L. Yu, "Toward integrating feature selection algorithms for classification and clustering," IEEE Trans. Knowl. Data Eng., vol.17, no.3, pp.1-12, 2005.
-
(2005)
IEEE Trans. Knowl. Data Eng
, vol.17
, Issue.3
, pp. 1-12
-
-
Liu, H.1
Yu, L.2
-
15
-
-
84943383590
-
Identifying important features for intrusion detection using support vector machines and neural networks
-
IEEE Computer Society Press
-
A.H. Sung and S. Mukkamala, "Identifying important features for intrusion detection using support vector machines and neural networks," Proc. 2003 Int. Symposium on Applications and the Internet Technology, pp.209-216, IEEE Computer Society Press, 2003.
-
(2003)
Proc. 2003 Int. Symposium on Applications and the Internet Technology
, pp. 209-216
-
-
Sung, A.H.1
Mukkamala, S.2
-
16
-
-
24944485860
-
Fusions of GA and SVM for anomaly detection in intrusion detection system
-
Springer Verlag
-
D. Kim, H.-N. Nguyen, S.-Y. Ohn, and J. Park, "Fusions of GA and SVM for anomaly detection in intrusion detection system," Lecture Notes in Computer Science, vol.3498, pp.415-420, Springer Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3498
, pp. 415-420
-
-
Kim, D.1
Nguyen, H.-N.2
Ohn, S.-Y.3
Park, J.4
-
18
-
-
0002593344
-
Multi-interval discretization of continuous attributes as pre-processing for classification learning
-
U. Fayyad and K. Irani, "Multi-interval discretization of continuous attributes as pre-processing for classification learning," Proc. 13th Int. Join Conf. on Artificial Intelligence, pp.1022-1027, 1993.
-
(1993)
Proc. 13th Int. Join Conf. on Artificial Intelligence
, pp. 1022-1027
-
-
Fayyad, U.1
Irani, K.2
-
19
-
-
85027160935
-
-
W.H. Press, B.P. Flannery, S.A. Teukolsky, and W.T. Vetterling, Numerical recipes in C, Cambridge University Press, Cambridge, 1988.
-
W.H. Press, B.P. Flannery, S.A. Teukolsky, and W.T. Vetterling, Numerical recipes in C, Cambridge University Press, Cambridge, 1988.
-
-
-
-
20
-
-
33744933912
-
Data reduction and data classification in an intrusion detection system
-
Texas, USA
-
S. Chebrolu, A. Abraham, and J.P. Thomas, "Data reduction and data classification in an intrusion detection system," Proc. South Central Information Security Symposium, Texas, USA, 2004.
-
(2004)
Proc. South Central Information Security Symposium
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
21
-
-
49649112245
-
On failure of machine learning algorithms for detecting misuse in KDD intrusion detection data set
-
M. Sabhnani and G. Serpen, "On failure of machine learning algorithms for detecting misuse in KDD intrusion detection data set," Journal of Intelligent Data Analysis, vol.8, no.4, pp.403-415, 2004.
-
(2004)
Journal of Intelligent Data Analysis
, vol.8
, Issue.4
, pp. 403-415
-
-
Sabhnani, M.1
Serpen, G.2
-
23
-
-
0003587805
-
Introduction to genetic Algorithms
-
MIT Press
-
M. Mitchell, Introduction to genetic Algorithms, 5th printing, MIT Press, 1999.
-
(1999)
5th printing
-
-
Mitchell, M.1
-
26
-
-
0003922190
-
-
2nd ed, Wiley Interscience Inc
-
R.O. Duda, P.E. Hart, and D.G. Stork, Pattern Classification, 2nd ed., Wiley Interscience Inc., 2001.
-
(2001)
Pattern Classification
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
-
27
-
-
0002714543
-
Making large-scale SVM learning practical
-
ed. B. Scholkopf, C. Burges, and A. Smola, chapter 11, MIT Press
-
T. Joachims, "Making large-scale SVM learning practical," in Advances in Kernel Methods - Support Vector Learning, ed. B. Scholkopf, C. Burges, and A. Smola, chapter 11, MIT Press, 1999.
-
(1999)
Advances in Kernel Methods - Support Vector Learning
-
-
Joachims, T.1
-
28
-
-
34547626171
-
Anomaly detection enhanced classification in computer intrusion detection
-
M. Fugate and J.R. Gattiker, "Anomaly detection enhanced classification in computer intrusion detection," LANL Tech Report, LAUR-02-1149, 2002.
-
(2002)
LANL Tech Report, LAUR-02-1149
-
-
Fugate, M.1
Gattiker, J.R.2
-
29
-
-
24944586818
-
Network-based intrusion detection with support vector machines
-
ICOIN 2003, Springer-Verlag
-
D. Kim and J. Park, "Network-based intrusion detection with support vector machines," ICOIN 2003, Lecture Notes in Computer Science, vol.2662, Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2662
-
-
Kim, D.1
Park, J.2
-
30
-
-
0036085392
-
Intrusion detection using neural networks and support vector machines
-
S. Mukkamala, G. Janoski, and A. Sung, "Intrusion detection using neural networks and support vector machines," Proc. IEEE Int. Joint Conf. on Neural Networks, pp.1702-1707, 2002.
-
(2002)
Proc. IEEE Int. Joint Conf. on Neural Networks
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.3
-
32
-
-
0035478854
-
Random forest
-
L. Breiman, "Random forest," Mach. Learn., vol.45, pp.5-32, 2001.
-
(2001)
Mach. Learn
, vol.45
, pp. 5-32
-
-
Breiman, L.1
-
33
-
-
0003802343
-
-
Chapman and Hall, New York
-
L. Breiman, J.H. Friedman, R.A. Olshen, and C.J. Stone, Classification and Regression Trees, Chapman and Hall, New York, 1984.
-
(1984)
Classification and Regression Trees
-
-
Breiman, L.1
Friedman, J.H.2
Olshen, R.A.3
Stone, C.J.4
-
34
-
-
85027123998
-
-
The R Project for Statistical Computing, http://www.r-project.org/
-
-
-
|