-
2
-
-
0014060964
-
A clustering technique for summarizing multivariate data
-
G. Ball, and D. Hall A clustering technique for summarizing multivariate data Behavioral Science 12 1967 153 155
-
(1967)
Behavioral Science
, vol.12
, pp. 153-155
-
-
Ball, G.1
Hall, D.2
-
3
-
-
0000667930
-
Training nu-support vector classifiers: Theory and algorithms
-
C.C. Chang, and C.J. Lin Training nu-support vector classifiers: Theory and algorithms Neural Computation 13 9 2001 2119 2147
-
(2001)
Neural Computation
, vol.13
, Issue.9
, pp. 2119-2147
-
-
Chang, C.C.1
Lin, C.J.2
-
4
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
S. Chebrolu, A. Abraham, and J.P. Thomas Feature deduction and ensemble design of intrusion detection systems Computers and Security 24 4 2005 295 307
-
(2005)
Computers and Security
, vol.24
, Issue.4
, pp. 295-307
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
5
-
-
34247263845
-
Anomaly-based intrusion detection using fuzzy rough clustering
-
Chimphlee, W.; Addullah, A. H.; Sap, M. N. M.; Srinoy, S.; & Chimphlee, S. (2006). Anomaly-based intrusion detection using fuzzy rough clustering. In Paper presented at the international conference on hybrid information technology (ICHIT' 06).
-
(2006)
Paper Presented at the International Conference on Hybrid Information Technology (ICHIT' 06)
-
-
Chimphlee, W.1
Addullah, A.H.2
Sap, M.N.M.3
Srinoy, S.4
Chimphlee, S.5
-
6
-
-
25844491810
-
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
-
O. Depren, M. Topallar, E. Anarim, and M.K. Ciliz An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks Expert Systems with Applications 29 2005 713 722
-
(2005)
Expert Systems with Applications
, vol.29
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Ciliz, M.K.4
-
7
-
-
77950021963
-
CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS
-
J.F.C. Joseph, A. Das, B.S. Lee, and B.C. Seet CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS Computer Networks 54 7 2010 1126 1141
-
(2010)
Computer Networks
, vol.54
, Issue.7
, pp. 1126-1141
-
-
Joseph, J.F.C.1
Das, A.2
Lee, B.S.3
Seet, B.C.4
-
8
-
-
36049030250
-
A new intrusion detection system using support vector machines and hierarchical clustering
-
L. Khan, M. Awad, and B. Thuraisingham A new intrusion detection system using support vector machines and hierarchical clustering The VLDB Journal 16 2007 507 521
-
(2007)
The VLDB Journal
, vol.16
, pp. 507-521
-
-
Khan, L.1
Awad, M.2
Thuraisingham, B.3
-
9
-
-
0031381525
-
Wrappers for feature subset selection
-
R. Kohavi, and G.H. John Wrappers for feature subset selection Artificial Intelligence 97 1997 273 324
-
(1997)
Artificial Intelligence
, vol.97
, pp. 273-324
-
-
Kohavi, R.1
John, G.H.2
-
10
-
-
36549085110
-
An active learning based TCM-KNN algorithm for supervised network intrusion detection
-
Y. Li, and L. Guo An active learning based TCM-KNN algorithm for supervised network intrusion detection Computer and Security 26 2007 459 467
-
(2007)
Computer and Security
, vol.26
, pp. 459-467
-
-
Li, Y.1
Guo, L.2
-
11
-
-
67649726426
-
Building lightweight intrusion detection system using wrapper-based feature selection mechanisms
-
Y. Li, J.L. Wang, Z.H. Tian, T.B. Lu, and C. Young Building lightweight intrusion detection system using wrapper-based feature selection mechanisms Computers and Security 28 6 2009 466 475
-
(2009)
Computers and Security
, vol.28
, Issue.6
, pp. 466-475
-
-
Li, Y.1
Wang, J.L.2
Tian, Z.H.3
Lu, T.B.4
Young, C.5
-
13
-
-
69249216488
-
An adaptive genetic-based signature learning system for intrusion detection
-
K. Shafi, and H.A. Abbass An adaptive genetic-based signature learning system for intrusion detection Expert Systems with Applications 36 10 2009 12036 12043
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.10
, pp. 12036-12043
-
-
Shafi, K.1
Abbass, H.A.2
-
15
-
-
68949161842
-
A triangle area based nearest neighbors approach to intrusion detection
-
C.F. Tsai, and C.Y. Lin A triangle area based nearest neighbors approach to intrusion detection Pattern Recognition 43 1 2010 222 229
-
(2010)
Pattern Recognition
, vol.43
, Issue.1
, pp. 222-229
-
-
Tsai, C.F.1
Lin, C.Y.2
-
16
-
-
34247636165
-
Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection
-
C.H. Tsang, S. Kwong, and H. Wang Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection Pattern Recognition 40 2007 2373 2391
-
(2007)
Pattern Recognition
, vol.40
, pp. 2373-2391
-
-
Tsang, C.H.1
Kwong, S.2
Wang, H.3
-
19
-
-
84941079784
-
A new approach to intrusion detection using artificial neural networks and fuzzy clustering
-
G. Wang, J. Hao, J. Ma, and L. Huang A new approach to intrusion detection using artificial neural networks and fuzzy clustering Expert Systems with Applications 37 2010 6225 6232
-
(2010)
Expert Systems with Applications
, vol.37
, pp. 6225-6232
-
-
Wang, G.1
Hao, J.2
Ma, J.3
Huang, L.4
-
20
-
-
70350134739
-
Use of computational intelligence in intrusion detection systems: A review
-
S.X. Wu, and W. Banzhaf Use of computational intelligence in intrusion detection systems: A review Applied Soft Computing 10 1 2010 1 35
-
(2010)
Applied Soft Computing
, vol.10
, Issue.1
, pp. 1-35
-
-
Wu, S.X.1
Banzhaf, W.2
-
21
-
-
40849099949
-
Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees
-
C. Xiang, P.C. Yong, and L.S. Meng Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees Pattern Recognition Letters 29 7 2008 918 924
-
(2008)
Pattern Recognition Letters
, vol.29
, Issue.7
, pp. 918-924
-
-
Xiang, C.1
Yong, P.C.2
Meng, L.S.3
|