-
1
-
-
77951619009
-
Compatibility as a heuristic for construction of rules by artificial ants
-
Feb
-
Waseem Shahzad, Abdul Rauf Baig, "Compatibility As a Heuristic For Construction Of Rules By Artificial Ants", Journal of Circuits, Systems, and Computers, vol. 19, no. 1, pp. 297-306, Feb. 2010.
-
(2010)
Journal of Circuits, Systems, and Computers
, vol.19
, Issue.1
, pp. 297-306
-
-
Shahzad, W.1
Baig, A.R.2
-
3
-
-
4544229404
-
ADAM: Detecting intrusions by data mining
-
NY, USA, June
-
Daniel Barbarra, Julia Couto, Sushil Jajodia, Leonard Popyack, and Ningning Wu, "ADAM: Detecting Intrusions by Data Mining", Proceedings of the 2001 IEEE, Workshop on Information Assurance and Security, NY, USA, June 2001.
-
(2001)
Proceedings of the 2001 IEEE, Workshop on Information Assurance and Security
-
-
Barbarra, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Wu, N.5
-
4
-
-
5044228031
-
A fuzzy data mining based intrusion detection system
-
Suzhou, China, May 26-28
-
th International Workshop on future Trends in Distributed Computing Systems (FTDCS04) IEEE Computer Society, Suzhou, China, May 26-28, 2004, pp. 191-197
-
(2004)
th International Workshop on Future Trends in Distributed Computing Systems (FTDCS04) IEEE Computer Society
, pp. 191-197
-
-
Jin, H.1
Sun, J.2
Chen, H.3
Han, Z.4
-
5
-
-
80052008269
-
-
Irvine, CA, USA
-
KDD'99 datasets, The UCI KDD Archive, http://kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html, Irvine, CA, USA, 1999.
-
(1999)
KDD'99 Datasets, the UCI KDD Archive
-
-
-
6
-
-
16244370106
-
Robust prediction of fault-proneness by random forests
-
ISSRE 2004 Proceedings; 15th International Symposium on Software Reliability Engineering
-
Lan Guo, Yan Ma, Bojan Cukic, and Harshinder Singh, "Robust Prediction of Fault-Proneness by Random Forests", Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE'04), pp. 417-428, Brittany, France, November 2004. (Pubitemid 40455712)
-
(2004)
Proceedings - International Symposium on Software Reliability Engineering, ISSRE
, pp. 417-428
-
-
Guo, L.1
Ma, Y.2
Cukic, B.3
Singh, H.4
-
7
-
-
79951822194
-
Chaotic binary particle swarm optimization for feature selection using logistic map
-
Hong Kong, March
-
Li-Yeh Chuang, Jung-Chike Li, and Cheng-Hong Yang, "Chaotic Binary Particle Swarm Optimization for Feature Selection using Logistic Map", In Proceedings of the International Multi Conference of Engineers and Computer Scientists (IMECS 2008), Hong Kong, pp. 131-136, March 2008.
-
(2008)
Proceedings of the International Multi Conference of Engineers and Computer Scientists (IMECS 2008)
, pp. 131-136
-
-
Chuang, L.1
Li, J.2
Yang, C.3
-
8
-
-
10844237614
-
An analysis of the 1999 DARPA/lincoln laboratory evaluation data for network anomaly detection
-
Pittsburgh, USA, September
-
M. Mahoney and P. Chan, "An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection", Proceeding of Recent Advances in Intrusion Detection (RAID)-2003, Pittsburgh, USA, September 2003.
-
(2003)
Proceeding of Recent Advances in Intrusion Detection (RAID)-2003
-
-
Mahoney, M.1
Chan, P.2
-
9
-
-
70349509437
-
A feature selection approach for network intrusion detection
-
Kuala Lumpur, Malaysia
-
Kok-Chin Khor, Choo-Yee Ting, Somnuk-Phon Amnuaisuk, "A Feature Selection Approach for Network Intrusion Detection", International Conference on Information Management and Engineering, Kuala Lumpur, Malaysia, pp. 133-137, 2009.
-
(2009)
International Conference on Information Management and Engineering
, pp. 133-137
-
-
Khor, K.1
Ting, C.2
Amnuaisuk, S.3
-
10
-
-
72449131513
-
From feature selection to building of Bayesian classifiers: A network intrusion detection perspective
-
Kok-Chin Khor, Choo-Yee Ting, Somnuk-Phon Amnuaisuk, "From feature selection to building of Bayesian classifiers: a network intrusion detection perspective", American Journal of Applied Sciences, 6 (11), pp. 1949-1960, 2009
-
(2009)
American Journal of Applied Sciences
, vol.6
, Issue.11
, pp. 1949-1960
-
-
Khor, K.1
Ting, C.2
Amnuaisuk, S.3
-
12
-
-
24944552355
-
Feature selection and intrusion detection using hybrid flexible neural tree
-
Advances in Neural Networks - ISNN 2005: Second International Symposium on Neural Networks. Proceedings
-
Yuehui Chen, Ajith Abraham and Ju Yang, "Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree", International Symposium on Neural Networks (ISNN 2005) LNCS 3498, pp. 439-444, 2005. (Pubitemid 41315125)
-
(2005)
Lecture Notes in Computer Science
, vol.3498
, Issue.3
, pp. 439-444
-
-
Chen, Y.1
Abraham, A.2
Yang, J.3
-
13
-
-
63749120226
-
Network intrusion detection design using feature selection of soft computing paradigms
-
October 31
-
T. S. Chou, K. K. Yen, and J. Luo, "Network Intrusion Detection Design Using Feature Selection of Soft Computing Paradigms", International Journal of Computational Intelligence, Page (s): 196-208, October 31, 2007.
-
(2007)
International Journal of Computational Intelligence
, pp. 196-208
-
-
Chou, T.S.1
Yen, K.K.2
Luo, J.3
-
14
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
DOI 10.1016/j.cose.2004.09.008, PII S016740480400238X
-
Srilatha Chebrolu, Ajith Abraham, Johnson P. Thomas, "Feature Deduction and Ensemble Design of Intrusion Detection Systems", Computers & Security, Vol. 24, Issue 4, June 2005, Pages 295-307 (Pubitemid 40752313)
-
(2005)
Computers and Security
, vol.24
, Issue.4
, pp. 295-307
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
16
-
-
80052007239
-
-
PSO overview http://www.swarmintelligence.org/
-
PSO Overview
-
-
-
17
-
-
0035478854
-
Random forests
-
DOI 10.1023/A:1010933404324
-
Leo Breiman, "Random Forests", Machine Learning, Vol. 45 Issue 1, pp. 5-32, 2001, Kluwer Academic Publishers. (Pubitemid 32933532)
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
18
-
-
80051954981
-
-
http://www.stat.berkeley.edu/~breiman/RandomForests/cc-home.htm
-
-
-
-
19
-
-
70350602937
-
Feature Selection using PSO-SVM
-
Feb
-
Chung-Jui Tu, Li-Yeh Chuang, Jun-Yang Chang, and Cheng-Hong Yang, "Feature Selection using PSO-SVM", IAENG International Journal of Computer Science, Vol. 33, Issue 1, Feb. 2007.
-
(2007)
IAENG International Journal of Computer Science
, vol.33
, Issue.1
-
-
Tu, C.1
Chuang, L.2
Chang, J.3
Yang, C.4
-
20
-
-
80051959503
-
-
http://www.cs.waikato.ac.nz/ml/weka/index.html.
-
-
-
-
21
-
-
17444432965
-
Hierarchical Kohonenen Net for anomaly detection in network security
-
DOI 10.1109/TSMCB.2005.843274
-
S. T. Sarasama, Q. A. Zhu and J. Huff, "Hierarchical kohonen Net for Anomaly Detection in Network Security", IEEE Transactions on Systems, Man and Cybernatics-Part B: Cybernatics, 35(2), 2005, pp. 302-312. (Pubitemid 40535913)
-
(2005)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.35
, Issue.2
, pp. 302-312
-
-
Sarasamma, S.T.1
Zhu, Q.A.2
Huff, J.3
|