-
3
-
-
33847218306
-
On the combination of Naive Bayes and decision trees for intrusion detection
-
Benferhat, S.; & Tabia, K. (2006). On the combination of Naive Bayes and decision trees for intrusion detection. In: IEEE International Conference on Computational Intelligence for Modelling, Control and Automation, 2005 and International Conference on Intelligent Agents, Web Technologies and Internet Commerce, 1, pp. 211-216.
-
(2006)
IEEE International Conference on Computational Intelligence for Modelling, Control and Automation, 2005 and International Conference on Intelligent Agents, Web Technologies and Internet Commerce
, vol.1
, pp. 211-216
-
-
Benferhat, S.1
Tabia, K.2
-
7
-
-
33847704184
-
K-Means+ID3: A novel method for supervised anomaly detection by cascading K-Means clustering and ID3 decision tree learning methods
-
Shekhar R. Gaddam, Vir V. Phoha Kiran, and S. Balagani K-Means+ID3: A novel method for supervised anomaly detection by cascading K-Means clustering and ID3 decision tree learning methods IEEE Transactions on Knowledge and Data Engineering 19 2007 3
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, pp. 3
-
-
Gaddam, S.R.1
Phoha Kiran, V.V.2
Balagani, S.3
-
9
-
-
17044405923
-
Toward integrating feature selection algorithms for classification and clustering
-
H. Liu, and L. Yu Toward integrating feature selection algorithms for classification and clustering IEEE Transactions on Knowledge and Data Engineering 17 2005 491 502
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, pp. 491-502
-
-
Liu, H.1
Yu, L.2
-
10
-
-
0037411435
-
The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors
-
D. Joo, T. Hong, and I. Han The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors Expert Systems with Applications 25 2003 69 75
-
(2003)
Expert Systems with Applications
, vol.25
, pp. 69-75
-
-
Joo, D.1
Hong, T.2
Han, I.3
-
11
-
-
81855183518
-
-
KDD Cup, (1999). Available on: http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html, 2007.
-
(1999)
KDD Cup
-
-
-
12
-
-
81855177610
-
A Classifier Ensemble Approach to Intrusion Detection for Network-Initiated Attacks
-
Koutsoutos, S.; Christou, I. T.; & Efremidis, S. (2007). A Classifier Ensemble Approach to Intrusion Detection for Network-Initiated Attacks, In: Proceeding of the international conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies, pp.307-319.
-
(2007)
Proceeding of the International Conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in EHealth, HCI, Information Retrieval and Pervasive Technologies
, pp. 307-319
-
-
Koutsoutos, S.1
Christou, I.T.2
Efremidis, S.3
-
16
-
-
33744584654
-
Induction of decision trees
-
J.R. Quinlan Induction of decision trees Machine Learning 1 1986 81 106
-
(1986)
Machine Learning
, vol.1
, pp. 81-106
-
-
Quinlan, J.R.1
-
18
-
-
17444432965
-
Hierarchical Kohonen net for anomaly detection in network security
-
S. Sarasamma, Q. Zhu, and J. Huff Hierarchical Kohonen net for anomaly detection in network security IEEE Transactions on System, Man and Cybernetics, Part B Cybernetics 35 2005 302 312
-
(2005)
IEEE Transactions on System, Man and Cybernetics, Part B Cybernetics
, vol.35
, pp. 302-312
-
-
Sarasamma, S.1
Zhu, Q.2
Huff, J.3
-
23
-
-
41749107387
-
AdaBoost based algorithm for network intrusion detection
-
Hu Weiming, Hu Wei, and S. Maybank AdaBoost based algorithm for network intrusion detection IEEE Transactions on Systems, Man and Cybernetics, Part B Cybernetics 38 2008 577 583
-
(2008)
IEEE Transactions on Systems, Man and Cybernetics, Part B Cybernetics
, vol.38
, pp. 577-583
-
-
Weiming, H.1
Wei, H.2
Maybank, S.3
|