메뉴 건너뛰기




Volumn 147, Issue , 2004, Pages 241-258

Eigenconnections to intrusion detection

Author keywords

Decision trees; Intrusion detection; KDD 99; Nearest neighbor; Principal component analysis

Indexed keywords

DECISION TREES; FORESTRY; INTRUSION DETECTION; MACHINE LEARNING; PRINCIPAL COMPONENT ANALYSIS; VECTOR SPACES;

EID: 79551665842     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/1-4020-8143-x_16     Document Type: Conference Paper
Times cited : (18)

References (28)
  • 3
    • 0003092797 scopus 로고    scopus 로고
    • Combining Nearest Neighbor Classificrs Through Multiple Feature Subsets
    • San Francisco, CA. Morgan Kaufmann
    • Bay, S. D. (1998). Combining Nearest Neighbor Classificrs Through Multiple Feature Subsets. In Proceedings of the 15th International Conf on Machine Learning, pages 37-45, San Francisco, CA. Morgan Kaufmann.
    • (1998) Proceedings of the 15th International Conf On Machine Learning , pp. 37-45
    • Bay, S.D.1
  • 7
    • 0026375158 scopus 로고
    • A Computational Demand Optimization Aide for Nearest-NeighborBased Decision systems
    • Morgan Kaufmann
    • Dasarathy, B. V. (1991). A Computational Demand Optimization Aide for Nearest-NeighborBased Decision systems. In IEEE International Conference on Systems. Man and Cybernetics, pages 1777-1782. Morgan Kaufmann.
    • (1991) IEEE International Conference On Systems. Man and Cybernetics , pp. 1777-1782
    • Dasarathy, B.V.1
  • 13
    • 58149421595 scopus 로고
    • Analysis of a complex statistical variables into principal components
    • Hotelling, H. (1933). Analysis of a complex statistical variables into principal components. Journal of Educational Psychology, 24:417-441.
    • (1933) Journal of Educational Psychology , vol.24 , pp. 417-441
    • Hotelling, H.1
  • 14
    • 0027150412 scopus 로고
    • Ustat, a real time intrusion detection system for UNrX
    • Oakland, CA
    • IIgun, K. (1993). Ustat, a real time intrusion detection system for UNrX. In IEEE Symposium on Security and Privacy, pages 16-28, Oakland, CA.
    • (1993) IEEE Symposium On Security and Privacy , pp. 16-28
    • Iigun, K.1
  • 16
    • 69249205008 scopus 로고    scopus 로고
    • KDD Cup, Available at
    • KDD Cup (1999). KDD Cup 99 Intrusion Detection Datasets. Available at: http://kdd.ics.uci.eduldatabases/kddcup99/kddcup99.html.
    • (1999) KDD Cup 99 Intrusion Detection Datasets
  • 17
    • 84892565625 scopus 로고    scopus 로고
    • KDD Task, Available at
    • KDD Task (1999). KDD 99 Task. Available at: http://kdd.ics.uci.eduldatabases/kddcup99/task.html.
    • (1999) KDD 99 Task
  • 21
    • 1642354876 scopus 로고    scopus 로고
    • KDD-99 Classifier Leaming Contest LLSoft's Results Overview. SIGKDD Explorations
    • Levin, I. (2000). KDD-99 Classifier Leaming Contest LLSoft's Results Overview. SIGKDD Explorations. ACM SIGKDD, 1:67-71.
    • (2000) ACM SIGKDD , vol.1 , pp. 67-71
    • Levin, I.1
  • 23
    • 0347606556 scopus 로고    scopus 로고
    • Winning the KDD Classification Cup: Bagged Boosting
    • Pfahringer, B. (2000). Winning the KDD Classification Cup: Bagged Boosting. SIGKDD Explorations. ACM SIGKDD, 1:65-66.
    • (2000) SIGKDD Explorations. ACM SIGKDD , vol.1 , pp. 65-66
    • Pfahringer, B.1
  • 24
    • 33744584654 scopus 로고
    • Induction of decision trees
    • Quinlan, J. R. (1986). Induction of decision trees. Machine Leaming, 1:1-106.
    • (1986) Machine Leaming , vol.1 , pp. 1-106
    • Quinlan, J.R.1
  • 27
    • 33745898005 scopus 로고    scopus 로고
    • On Failure of Machine Leaming AIgorithms for detecting Misuse in KDD intrusion Detection Data Set
    • To Appear
    • Sabhnani, M. and Serpen, G. (2004). On Failure of Machine Leaming AIgorithms for detecting Misuse in KDD intrusion Detection Data Set. Intelligent Analysis. To Appear.
    • (2004) Intelligent Analysis
    • Sabhnani, M.1    Serpen, G.2
  • 28
    • 22844449044 scopus 로고
    • Eigenfaces for Recognition
    • Turk, M. and Pentland, A. (1991). Eigenfaces for Recognition. Cognitive Neuroscience, 13(1):7196.
    • (1991) Cognitive Neuroscience , vol.13 , Issue.1 , pp. 7196
    • Turk, M.1    Pentland, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.