-
2
-
-
0036825821
-
Kernel methods: A survey of current techniques
-
C. Campbell Kernel methods: A survey of current techniques Neurocomputing 48 2000 63 84
-
(2000)
Neurocomputing
, vol.48
, pp. 63-84
-
-
Campbell, C.1
-
7
-
-
33646023117
-
An introduction to ROC analysis
-
T. Fawcett An introduction to ROC analysis Pattern Recognition Letters 27 2006 861 874
-
(2006)
Pattern Recognition Letters
, vol.27
, pp. 861-874
-
-
Fawcett, T.1
-
8
-
-
28444457043
-
An unsupervised anomaly intrusion detection algorithm based on swarm intelligence
-
2005 International Conference on Machine Learning and Cybernetics, ICMLC 2005
-
Feng, Y.; Wu, Z.-F.; Wu, K.-G.; Xiong, Z.-Y.; & Zhou, Y. (2005). An unsupervised anomaly intrusion detection algorithm based on swarm intelligence. In Proceedings of 2005 international conference on machine learning and cybernetics. (Vol. 7, pp. 3965-3969). (Pubitemid 41734605)
-
(2005)
2005 International Conference on Machine Learning and Cybernetics, ICMLC 2005
, pp. 3965-3969
-
-
Feng, Y.1
Wu, Z.-F.2
Wu, K.-G.3
Xiong, Z.-Y.4
Zhou, Y.5
-
11
-
-
1542284996
-
Improving one-class svm for anomaly detection
-
Li, K.-L.; Huang, H.-K.; Tian, S.-F.; & Xu, W. (2003). Improving one-class svm for anomaly detection. In 2003 International conference on machine learning and cybernetics (Vol. 5, pp. 3077-3081).
-
(2003)
2003 International Conference on Machine Learning and Cybernetics
, vol.5
, pp. 3077-3081
-
-
Li, K.-L.1
Huang, H.-K.2
Tian, S.-F.3
Xu, W.4
-
12
-
-
85016684916
-
Intrusion detection in unlabeled data with quarter-sphere support vector machines
-
Laskov, P.; Schafer, C.; & Kotenko, I. (2004). Intrusion detection in unlabeled data with quarter-sphere support vector machines. In Proceedings of 2004 DIMVA (pp. 71-82).
-
(2004)
Proceedings of 2004 DIMVA
, pp. 71-82
-
-
Laskov, P.1
Schafer, C.2
Kotenko, I.3
-
15
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation
-
Lippmann, R.; Fried, D.; Graf, I.; Haines, J.; Kendall, K.; McClung, D.; Weber, D.; Webster, S.; Wyschogrod, D.; Cunningham, R.; & Zissman, M. (2000). Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation. In DARPA information survivability conference and exposition, 2000. DISCEX '00. Proceedings (Vol. 2, pp. 12-26).
-
(2000)
DARPA Information Survivability Conference and Exposition, 2000. DISCEX '00. Proceedings
, vol.2
, pp. 12-26
-
-
Lippmann, R.1
Fried, D.2
Graf, I.3
Haines, J.4
Kendall, K.5
McClung, D.6
Weber, D.7
Webster, S.8
Wyschogrod, D.9
Cunningham, R.10
Zissman, M.11
-
18
-
-
11144273669
-
The perceptron: A probabilistic model for information storage and organization in the brain
-
F. Rosenblatt The perceptron: A probabilistic model for information storage and organization in the brain Psychological Review 65 1958 386 408
-
(1958)
Psychological Review
, vol.65
, pp. 386-408
-
-
Rosenblatt, F.1
-
19
-
-
80054903725
-
-
Russo, V. (2008). LIBSVM Plus. http://neminis.org/software/libsvm-plus/.
-
(2008)
LIBSVM Plus
-
-
Russo, V.1
-
20
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
DOI 10.1162/089976601750264965
-
B. Schölkopf, J.C. Platt, J. Shawe-taylor, A.J. Smola, and R.C. Williamson Estimating the support of a high-dimensional distribution Neural Computation 13 2001 1443 1471 (Pubitemid 33595028)
-
(2001)
Neural Computation
, vol.13
, Issue.7
, pp. 1443-1471
-
-
Scholkopf, B.1
Platt, J.C.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
22
-
-
52149097296
-
The problem of false alarms: Evaluation with Snort and DARPA 1999 dataset
-
Privacy and security in digital business, lecture notes in computer science Springer Berlin/ Heidelberg
-
G.C. Tjhai, M. Papadaki, S.M. Furnell, and N.L. Clarke The problem of false alarms: Evaluation with Snort and DARPA 1999 dataset Trust Privacy and security in digital business, lecture notes in computer science Vol. 5185 2008 Springer Berlin/ Heidelberg 139 150
-
(2008)
Trust
, vol.5185
, pp. 139-150
-
-
Tjhai, G.C.1
Papadaki, M.2
Furnell, S.M.3
Clarke, N.L.4
|