-
2
-
-
0036085392
-
Intrusion detection using neural networks and support vector machines
-
May
-
S. Mukkamala, G. Janoski, and A. Sung, "Intrusion detection using neural networks and support vector machines," in Proceedings of the International Joint Conference on Neural Networks, vol. 2, May 2002, pp. 1702-1707.
-
(2002)
Proceedings of the International Joint Conference on Neural Networks
, vol.2
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.3
-
3
-
-
79958178274
-
Extreme learning machines: A survey
-
G.-B. Huang, D. H. Wang, and Y. Lan, "Extreme learning machines: a survey," International Journal of Machine Leaning and Cybernetics, vol. 2, no. 2, pp. 107-122, 2011.
-
(2011)
International Journal of Machine Leaning and Cybernetics
, vol.2
, Issue.2
, pp. 107-122
-
-
Huang, G.-B.1
Wang, D.H.2
Lan, Y.3
-
4
-
-
84859007933
-
Extreme learning machines for regression and multiclass classification
-
G.-B. Huang, H. M. Zhou, X. J. Ding, and R. Zhang, "Extreme learning machines for regression and multiclass classification," IEEE Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics, vol. 42, no. 2, pp. 513-529, 2011.
-
(2011)
IEEE Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics
, vol.42
, Issue.2
, pp. 513-529
-
-
Huang, G.-B.1
Zhou, H.M.2
Ding, X.J.3
Zhang, R.4
-
5
-
-
10944272650
-
Extreme learning machine: A new learning scheme of feedforward neural networks
-
G.-B. Huang, Q.-Y. Zhu, and C.-K. Siew, "Extreme learning machine: a new learning scheme of feedforward neural networks," in Proceedings of IEEE International Joint Conference on Neural Networks, vol. 2, 2004, pp. 985-990.
-
(2004)
Proceedings of IEEE International Joint Conference on Neural Networks
, vol.2
, pp. 985-990
-
-
Huang, G.-B.1
Zhu, Q.-Y.2
Siew, C.-K.3
-
6
-
-
84865090469
-
-
[Online]
-
(1999) KDDCUP dataset. [Online]. Available: http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.html
-
(1999)
KDDCUP Dataset
-
-
-
8
-
-
0142187790
-
A research on intrusion detection based on unsupervised clustering and support vector machine
-
S. Qing, D. Gollmann, and J. Zhou, Eds. Springer Berlin / Heidelberg
-
M. Luo, L. Wang, H. Zhang, and J. Chen, "A research on intrusion detection based on unsupervised clustering and support vector machine," in Information and Communications Security, ser. Lecture Notes in Computer Science, S. Qing, D. Gollmann, and J. Zhou, Eds. Springer Berlin / Heidelberg, 2003, vol. 2836, pp. 325-336.
-
(2003)
Information and Communications Security, Ser. Lecture Notes in Computer Science
, vol.2836
, pp. 325-336
-
-
Luo, M.1
Wang, L.2
Zhang, H.3
Chen, J.4
-
9
-
-
24944586818
-
Network-based intrusion detection with support vector machines
-
H.-K. Kahng, Ed. Springer Berlin / Heidelberg
-
D. Kim and J. Park, "Network-based intrusion detection with support vector machines," in Information Networking, ser. Lecture Notes in Computer Science, H.-K. Kahng, Ed. Springer Berlin / Heidelberg, 2003, vol. 2662, pp. 747-756.
-
(2003)
Information Networking, Ser. Lecture Notes in Computer Science
, vol.2662
, pp. 747-756
-
-
Kim, D.1
Park, J.2
-
10
-
-
36849030790
-
Weighting versus pruning in rule validation for detecting network and host anomalies
-
ACM Press
-
G. Tandon, "Weighting versus pruning in rule validation for detecting network and host anomalies," in In Proceedings of the 13th ACM SIGKDD international. ACM Press, 2007.
-
(2007)
In Proceedings of the 13th ACM SIGKDD International
-
-
Tandon, G.1
-
11
-
-
0036321445
-
Use of k-nearest neighbor classifier for intrusion detection
-
Y. Liao and V. R. Vemuri, "Use of k-nearest neighbor classifier for intrusion detection," Computers & Security, vol. 25, pp. 439-448, 2002.
-
(2002)
Computers & Security
, vol.25
, pp. 439-448
-
-
Liao, Y.1
Vemuri, V.R.2
-
12
-
-
0038663185
-
Intrusion detection with unlabeled data using clustering
-
L. Portnoy, E. Eskin, and S. Stolfo, "Intrusion detection with unlabeled data using clustering," in In Proceedings of ACM CSS Workshop on Data Mining Applied to Security, 2001, pp. 5-8.
-
(2001)
In Proceedings of ACM CSS Workshop on Data Mining Applied to Security
, pp. 5-8
-
-
Portnoy, L.1
Eskin, E.2
Stolfo, S.3
-
13
-
-
85028098285
-
Parametric methods for anomaly detection in aggregate traffic
-
April
-
G. Thatte, U. Mitra, and J. Heidemann, "Parametric methods for anomaly detection in aggregate traffic," IEEE/ACM Transactions on Networking, vol. 19, no. 2, pp. 512-525, April 2011.
-
(2011)
IEEE/ACM Transactions on Networking
, vol.19
, Issue.2
, pp. 512-525
-
-
Thatte, G.1
Mitra, U.2
Heidemann, J.3
-
14
-
-
18844388178
-
Frequent episode rules for internet anomaly detection
-
Washington, DC, USA: IEEE Computer Society
-
M. Qin and K. Hwang, "Frequent episode rules for internet anomaly detection," in Proceedings of the Network Computing and Applications, Third IEEE International Symposium. Washington, DC, USA: IEEE Computer Society, 2004, pp. 161-168.
-
(2004)
Proceedings of the Network Computing and Applications, Third IEEE International Symposium
, pp. 161-168
-
-
Qin, M.1
Hwang, K.2
-
15
-
-
58549115037
-
Remote detection of bottleneck links using spectral and statistical methods
-
February
-
X. He, C. Papadopoulos, J. Heidemann, U. Mitra, and U. Riaz, "Remote detection of bottleneck links using spectral and statistical methods," Computer Networks, vol. 53, pp. 279-298, February 2009.
-
(2009)
Computer Networks
, vol.53
, pp. 279-298
-
-
He, X.1
Papadopoulos, C.2
Heidemann, J.3
Mitra, U.4
Riaz, U.5
-
17
-
-
34249753618
-
Support-vector networks
-
C. Cortes and V. Vapnik, "Support-vector networks," Machine Learning, vol. 20, pp. 273-297, 1995.
-
(1995)
Machine Learning
, vol.20
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
-
18
-
-
0036505670
-
A comparison of methods for multiclass support vector machines
-
C.-W. Hsu and C.-J. Lin, "A comparison of methods for multiclass support vector machines," IEEE Transactions on Neural Networks, vol. 13, no. 2, pp. 415-425, 2002.
-
(2002)
IEEE Transactions on Neural Networks
, vol.13
, Issue.2
, pp. 415-425
-
-
Hsu, C.-W.1
Lin, C.-J.2
-
21
-
-
84962238645
-
Costbased modeling for fraud and intrusion detection: Results from the JAM project
-
January
-
S. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. K. Chan, "Costbased modeling for fraud and intrusion detection: results from the JAM project," in Proceedings of DARPA Information Survivability Conference and Exposition, vol. 2, January 2002, pp. 130-144.
-
(2002)
Proceedings of DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 130-144
-
-
Stolfo, S.1
Fan, W.2
Lee, W.3
Prodromidis, A.4
Chan, P.K.5
-
22
-
-
78049383639
-
A practical guide to support vector classification
-
C.-W. Hsu, C.-C. Chang, and C.-J. Lin, "A practical guide to support vector classification," Bioinformatics, vol. 1, no. 1, pp. 1-16, 2010.
-
(2010)
Bioinformatics
, vol.1
, Issue.1
, pp. 1-16
-
-
Hsu, C.-W.1
Chang, C.-C.2
Lin, C.-J.3
-
23
-
-
79955702502
-
LIBSVM: A library for support vector machines
-
software
-
C.-C. Chang and C.-J. Lin, "LIBSVM: A library for support vector machines," ACM Transactions on Intelligent Systems and Technology, vol. 2, pp. 27:1-27:27, 2011, software available at http://www.csie.ntu.edu.tw/ cjlin/libsvm.
-
(2011)
ACM Transactions on Intelligent Systems and Technology
, vol.2
, pp. 271-2727
-
-
Chang, C.-C.1
Lin, C.-J.2
-
24
-
-
84865090468
-
-
[Online]
-
(2004) ELM MATLAB code. [Online]. Available: http://www.ntu.edu.sg/home/ egbhuang/ELM Codes.htm
-
(2004)
ELM MATLAB Code
-
-
-
25
-
-
33746593716
-
SVM and kernel methods MATLAB toolbox
-
INSA de Rouen, Rouen, France. [Online]
-
S. Canu, Y. Grandvalet, V. Guigue, and A. Rakotomamonjy, "SVM and kernel methods MATLAB toolbox," Perception Systmes et Information, INSA de Rouen, Rouen, France, 2005. [Online]. Available: http://asi.insa-rouen.fr/ enseignants/arakotom/toolbox/index.html
-
(2005)
Perception Systmes et Information
-
-
Canu, S.1
Grandvalet, Y.2
Guigue, V.3
Rakotomamonjy, A.4
|