-
3
-
-
0038330235
-
Fusion of multiple classifiers for intrusion detection in computer networks
-
DOI 10.1016/S0167-8655(03)00004-7
-
Giacinto G., Roli F., and Didaci L. Fusion of multiple classifiers for intrusion detection in computer networks Pattern Recognition Letters 24 12 2003 1795 1803 (Pubitemid 36558001)
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.12
, pp. 1795-1803
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
5
-
-
33745163595
-
Learning intrusion detection: Supervised or unsupervised?
-
DOI 10.1007/11553595-6, Image Analysis and Processing - ICIAP 2005, 13th International Conference, Proceedings
-
Laskov P., Dussel P., Schafer C., and Rieck K. Learning intrusion detection: supervised or unsupervised? Image Analysis and Processing-ICIAP 2005 2005 50 57 (Pubitemid 43901959)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS
, pp. 50-57
-
-
Laskov, P.1
Dussel, P.2
Schafer, C.3
Rieck, K.4
-
6
-
-
0142126712
-
Novelty detection: A review-part 2: Neural network based approaches
-
Markou M., and Singh S. Novelty detection: a review-part 2: neural network based approaches Signal Processing 83 12 2003 2499 2521
-
(2003)
Signal Processing
, vol.83
, Issue.12
, pp. 2499-2521
-
-
Markou, M.1
Singh, S.2
-
7
-
-
0038428854
-
Results of the kdd'99 classifier learning
-
Elkan C. Results of the kdd'99 classifier learning ACM SIGKDD Explorations Newsletter 1 2 2000 63 64
-
(2000)
ACM SIGKDD Explorations Newsletter
, vol.1
, Issue.2
, pp. 63-64
-
-
Elkan, C.1
-
8
-
-
34247625572
-
A multi-stage classification system for detecting intrusions in computer networks
-
Cordella L., and Sansone C. A multi-stage classification system for detecting intrusions in computer networks Pattern Analysis & Applications 10 2 2007 83 100
-
(2007)
Pattern Analysis & Applications
, vol.10
, Issue.2
, pp. 83-100
-
-
Cordella, L.1
Sansone, C.2
-
9
-
-
33745157910
-
Combining genetic-based misuse and anomaly detection for reliably detecting intrusions in computer networks
-
DOI 10.1007/11553595-8, Image Analysis and Processing - ICIAP 2005, 13th International Conference, Proceedings
-
Finizio I., Mazzariello C., and Sansone C. Combining genetic-based misuse and anomaly detection for reliably detecting intrusions in computer networks Image Analysis and Processing-ICIAP 2005 2005 66 74 (Pubitemid 43901961)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS
, pp. 66-74
-
-
Finizio, I.1
Mazzariello, C.2
Sansone, C.3
-
11
-
-
1842712339
-
A genetic clustering method for intrusion detection
-
DOI 10.1016/j.patcog.2003.09.011, PII S0031320303003935
-
Liu Y., Chen K., Liao X., and Zhang W. A genetic clustering method for intrusion detection Pattern Recognition 37 5 2004 927 942 (Pubitemid 38473836)
-
(2004)
Pattern Recognition
, vol.37
, Issue.5
, pp. 927-942
-
-
Liu, Y.1
Chen, K.2
Liao, X.3
Zhang, W.4
-
12
-
-
15944375471
-
Intrusion detection using hierarchical neural networks
-
DOI 10.1016/j.patrec.2004.09.045, PII S0167865504002624
-
Zhang C., Jiang J., and Kamel M. Intrusion detection using hierarchical neural networks Pattern Recognition Letters 26 6 2005 779 791 (Pubitemid 40430497)
-
(2005)
Pattern Recognition Letters
, vol.26
, Issue.6
, pp. 779-791
-
-
Zhang, C.1
Jiang, J.2
Kamel, M.3
-
14
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
Eskin E., Arnold A., Prerau M., Portnoy L., and Stolfo S. A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data Applications of Data Mining in Computer Security 2002 77 102
-
(2002)
Applications of Data Mining in Computer Security
, pp. 77-102
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
17
-
-
30144440941
-
Dempster-Shafer theory for intrusion detection in ad hoc networks
-
DOI 10.1109/MIC.2005.123
-
Chen T., and Venkataramanan V. Dempster-Shafer theory for intrusion detection in ad hoc networks IEEE Internet Computing 2005 35 41 (Pubitemid 43051366)
-
(2005)
IEEE Internet Computing
, vol.9
, Issue.6
, pp. 35-41
-
-
Chen, T.M.1
Venkataramanan, V.2
-
20
-
-
77951175098
-
Semi-supervised learning literature survey
-
University of Wisconsin-Madison
-
Zhu X. Semi-supervised learning literature survey Computer Science 2006 University of Wisconsin-Madison
-
(2006)
Computer Science
-
-
Zhu, X.1
-
21
-
-
0036532571
-
Switching between selection and fusion in combining classifiers: An experiment
-
DOI 10.1109/3477.990871, PII S1083441902006970
-
Kuncheva L. Switching between selection and fusion in combining classifiers: an experiment, Systems, Man, and Cybernetics, Part B: Cybernetics IEEE Transactions on 32 2 2002 146 156 (Pubitemid 34249373)
-
(2002)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.32
, Issue.2
, pp. 146-156
-
-
Kuncheva, L.I.1
-
22
-
-
0034830461
-
Decision templates for multiple classifier fusion: an experimental comparison
-
DOI 10.1016/S0031-3203(99)00223-X
-
L.I. Kuncheva, J.C. Bezdek, R.P.W. Duin, Decision templates for multiple classifier fusion: an experimental comparison, Pattern Recognition 34 (2001) 299-314. (Pubitemid 32871876)
-
(2001)
Pattern Recognition
, vol.34
, Issue.2
, pp. 299-314
-
-
Kuncheva, L.I.1
Bezdek, J.C.2
Duin, R.P.W.3
-
23
-
-
0026860706
-
Methods of combining multiple classifiers and their applications to handwriting recognition, Systems, Man and Cybernetics
-
Xu L., Krzyzak A., and Suen C. Methods of combining multiple classifiers and their applications to handwriting recognition, Systems, Man and Cybernetics IEEE Transactions on 22 3 1992 418 435
-
(1992)
IEEE Transactions on
, vol.22
, Issue.3
, pp. 418-435
-
-
Xu, L.1
Krzyzak, A.2
Suen, C.3
-
24
-
-
33646023117
-
An introduction to roc analysis
-
Fawcett T. An introduction to roc analysis Pattern Recognition Letters 27 8 2006 861 874
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.8
, pp. 861-874
-
-
Fawcett, T.1
-
25
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
McHugh J. Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory ACM Transactions on Information and System Security 3 4 2000 262 294
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
27
-
-
27244454402
-
Real time detection of novel attacks by means of data mining techniques
-
Esposito M., Mazzariello C., Oliviero F., Romano S., and Sansone C. Real time detection of novel attacks by means of data mining techniques Enterprise Information Systems VII 2006 197 204
-
(2006)
Enterprise Information Systems VII
, pp. 197-204
-
-
Esposito, M.1
Mazzariello, C.2
Oliviero, F.3
Romano, S.4
Sansone, C.5
|