-
1
-
-
77954653785
-
-
Hybrid learning machines, Neurocomputing (13-15
-
A. Abraham, E. Corchado, J.M. Corchado, Hybrid learning machines, Neurocomputing (13-15) (2009) 2729-2730.
-
(2009)
, pp. 2729-2730
-
-
Abraham, A.1
Corchado, E.2
Corchado, J.M.3
-
3
-
-
0033344304
-
-
Neural data mining for credit card fraud detection, in: ICTAI
-
R. Brause, T. Langsdorf, M. Hepp, Neural data mining for credit card fraud detection, in: ICTAI, 1999, pp. 103-106.
-
(1999)
, pp. 103-106
-
-
Brause, R.1
Langsdorf, T.2
Hepp, M.3
-
4
-
-
82455185170
-
-
Classification and Regression Trees, Wadsworth International
-
L. Breiman, J. Friedman, R. Olshen, C. Stone, Classification and Regression Trees, Wadsworth International, 1984, pp. 21-28.
-
(1984)
, pp. 21-28
-
-
Breiman, L.1
Friedman, J.2
Olshen, R.3
Stone, C.4
-
5
-
-
82455220493
-
-
Artificial neural networks for misuse detection, in: Proceedings of the 1998 National Information Systems Security Conference, Arlington, VA
-
J. Cannady, Artificial neural networks for misuse detection, in: Proceedings of the 1998 National Information Systems Security Conference, Arlington, VA, 1998, pp. 443-456.
-
(1998)
, pp. 443-456
-
-
Cannady, J.1
-
6
-
-
0033336136
-
Distributed data mining in credit card fraud detection
-
Chan P.K., Fan W., Prodromidis A.L., Stolfo S.J. Distributed data mining in credit card fraud detection. IEEE Intelligent Systems 1999, 14(6):67-74.
-
(1999)
IEEE Intelligent Systems
, vol.14
, Issue.6
, pp. 67-74
-
-
Chan, P.K.1
Fan, W.2
Prodromidis, A.L.3
Stolfo, S.J.4
-
7
-
-
0027837024
-
-
Experiments in multistrategy learning by meta-learning, in: Proceedings of the Second International Conference on Information and Knowledge Management
-
P.K. Chan, S.J. Stolfo, Experiments in multistrategy learning by meta-learning, in: Proceedings of the Second International Conference on Information and Knowledge Management, 1993, pp. 314-323.
-
(1993)
, pp. 314-323
-
-
Chan, P.K.1
Stolfo, S.J.2
-
8
-
-
78049271779
-
-
Hybrid intelligent algorithms and applications, Information Science
-
E. Corchado, A. Abraham, A.C.P.L.F. de Carvalho, Hybrid intelligent algorithms and applications, Information Science (14) (2010) 2633-2634.
-
(2010)
, vol.14
, pp. 2633-2634
-
-
Corchado, E.1
Abraham, A.2
de Carvalho, A.C.P.L.F.3
-
9
-
-
82455209098
-
-
Fuzzy and Neuro-fuzzy Intelligent Systems, Physica-Verlag, Heidelberg
-
E. Czogala, J. Leski, Fuzzy and Neuro-fuzzy Intelligent Systems, Physica-Verlag, Heidelberg, 2000, pp. 107-127.
-
(2000)
, pp. 107-127
-
-
Czogala, E.1
Leski, J.2
-
10
-
-
82455209102
-
-
Data mining for network intrusion detection, in: Proceeding NSF Workshop on Next Generation Data Mining
-
P. Dokas, L. Ertoz, V. Kumar, A. Lazarevic, J. Srivastava, P. Tan, Data mining for network intrusion detection, in: Proceeding NSF Workshop on Next Generation Data Mining, 2002, pp. 21-30.
-
(2002)
, pp. 21-30
-
-
Dokas, P.1
Ertoz, L.2
Kumar, V.3
Lazarevic, A.4
Srivastava, J.5
Tan, P.6
-
16
-
-
82455174945
-
-
The UCI KDD archive, 1999, University of California Department of Information and Computer Science, Irvine, CA
-
S. Hettich, S.D. Bay, The UCI KDD archive, 1999, University of California Department of Information and Computer Science, Irvine, CA, 2004, p. 1. http://kdd.ics.uci.edu.
-
(2004)
, pp. 1
-
-
Hettich, S.1
Bay, S.D.2
-
21
-
-
35048836559
-
-
Network intrusion detection using genetic clustering, in: Genetic and Evolutionary Computation, 3103/2004
-
E. Leon, O. Nasraoui, J. Gomez, Network intrusion detection using genetic clustering, in: Genetic and Evolutionary Computation, vol. 3103/2004, 2004, pp. 1312-1313.
-
(2004)
, pp. 1312-1313
-
-
Leon, E.1
Nasraoui, O.2
Gomez, J.3
-
22
-
-
0034300835
-
Improving intrusion detection performance using keyword selection and neural networks
-
Lippmann R.P., Cunningham R.K. Improving intrusion detection performance using keyword selection and neural networks. Computer Networks 2000, 34(4):597-603.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 597-603
-
-
Lippmann, R.P.1
Cunningham, R.K.2
-
23
-
-
78650135042
-
-
MOVIH-IDS: a mobile visualization hybrid intrusion detection system, Neurocomputing (13-15)
-
Á. Herrero, E. Corchado, M.A. Pellicer, A. Abraham, MOVIH-IDS: a mobile visualization hybrid intrusion detection system, Neurocomputing (13-15) (2009) 2775-2784.
-
(2009)
, pp. 2775-2784
-
-
Herrero, Á.1
Corchado, E.2
Pellicer, M.A.3
Abraham, A.4
-
26
-
-
82455174717
-
-
Counter Hack: A Step-by-step Guide to Computer Attacks and Effective Defenses
-
E. Skoudis, Counter Hack: A Step-by-step Guide to Computer Attacks and Effective Defenses, 2002.
-
(2002)
-
-
Skoudis, E.1
|