-
2
-
-
0003479517
-
-
1998, Morgan Kaufmann
-
Banzhaf, W., P. Nordin, R. Keller, F. Francone, 1998. Genetic Programming: An Introduction on the Automatic Evolution of Computer Programs and Its Applications. 1998, Morgan Kaufmann.
-
(1998)
Genetic Programming: An Introduction on the Automatic Evolution of Computer Programs and Its Applications
-
-
Banzhaf, W.1
Nordin, P.2
Keller, R.3
Francone, F.4
-
3
-
-
19944364877
-
Feature Deduction and Ensemble Design of Intrusion Detection Systems
-
Chebrolu, S., A. Abraham, J.P. Thomas, 2005. Feature Deduction and Ensemble Design of Intrusion Detection Systems. Journal of Computers and Security, 24(4): 295-307.
-
(2005)
Journal of Computers and Security
, vol.24
, Issue.4
, pp. 295-307
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
4
-
-
34547626540
-
-
Anjuran Springer-Verlag. Beijing, China
-
Chen, Y., Y. Li, X.Q. Cheng, L. Guo, 2006. Survey and taxonomy of feature selection algorithms in intrusion detection system. Anjuran Springer-Verlag. Beijing, China.
-
(2006)
Survey and taxonomy of feature selection algorithms in intrusion detection system
-
-
Chen, Y.1
Li, Y.2
Cheng, X.Q.3
Guo, L.4
-
5
-
-
4944252600
-
-
Software Demsar, J., B. Zupan, G. Leban, 2004
-
Chih-Chung, C., L. Chih-Jen, 2001. LIBSVM: a library for support vector machines, Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm. Demsar, J., B. Zupan, G. Leban, 2004.
-
(2001)
LIBSVM: a library for support vector machines
-
-
Chih-Chung, C.1
Chih-Jen, L.2
-
6
-
-
0037282635
-
Efficient anomaly detection by modeling privilege flows using hidden Markov model
-
Cho, S.B., H.J. Park, 2003. Efficient anomaly detection by modeling privilege flows using hidden Markov model. Computers & Security, 22(1): 45-55.
-
(2003)
Computers & Security
, vol.22
, Issue.1
, pp. 45-55
-
-
Cho, S.B.1
Park, H.J.2
-
8
-
-
46749114815
-
Fuzzy Vector Quantization for Network Intrusion Detection
-
IEEE International Conference on
-
Dat, T., M. Wanli, D. Sharma, N. Thien, 2007. Fuzzy Vector Quantization for Network Intrusion Detection. Granular Computing, 2007. GRC 2007. IEEE International Conference on, pp: 566-566.
-
(2007)
Granular Computing, 2007. GRC 2007
, pp. 566-1566
-
-
Dat, T.1
Wanli, M.2
Sharma, D.3
Thien, N.4
-
10
-
-
84857594993
-
ID-SOMGA: A Self Organising Migrating Genetic Algorithm-Based Solution for Intrusion Detection
-
Folorunso, O., O.O. Akande, A.O. Ogunde, O.R. Vincent, 2010. "ID-SOMGA: A Self Organising Migrating Genetic Algorithm-Based Solution for Intrusion Detection". Computer and Information Science, 3(4): 80-92.
-
(2010)
Computer and Information Science
, vol.3
, Issue.4
, pp. 80-92
-
-
Folorunso, O.1
Akande, O.O.2
Ogunde, A.O.3
Vincent, O.R.4
-
11
-
-
28444441282
-
Ant colony optimization based network intrusion feature selection and detection, Machine Learning and Cybernetics
-
Gao, H.H., H.H. Yang, X.Y. Wang, 2005. Ant colony optimization based network intrusion feature selection and detection, Machine Learning and Cybernetics, Proceedings of 2005 International Conference on, 6: 3871-3875.
-
(2005)
Proceedings of 2005 International Conference on
, vol.6
, pp. 3871-3875
-
-
Gao, H.H.1
Yang, H.H.2
Wang, X.Y.3
-
12
-
-
0242637092
-
Detecting intrusion with rule-based integration of multiple models
-
Han, S.J., S.B. Cho, 2003. Detecting intrusion with rule-based integration of multiple models. Computers & Security, 22(7): 613-623.
-
(2003)
Computers & Security
, vol.22
, Issue.7
, pp. 613-623
-
-
Han, S.J.1
Cho, S.B.2
-
13
-
-
84865985216
-
-
http://kdd.ics.uci.edu/database/kddcup99/kddcup99.html.
-
-
-
-
15
-
-
84865969854
-
-
A comparative study of anomaly detection schemes in network intrusion detection, hlm
-
Lazarevic, A., L. Ertoz, V. Kumar, A. Ozgur, J. Srivastava, 2003. A comparative study of anomaly detection schemes in network intrusion detection, hlm.
-
(2003)
-
-
Lazarevic, A.1
Ertoz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
16
-
-
0034300835
-
Improving intrusion detection performance using keyword selection and neural networks
-
Lippmann, R.P., R.K. Cunningham, 2000. Improving intrusion detection performance using keyword selection and neural networks. Computer Networks, 34(4): 597-603.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 597-603
-
-
Lippmann, R.P.1
Cunningham, R.K.2
-
17
-
-
33947583022
-
Intrusion Detection Systems Using Adaptive Regression Spines
-
Mukkamala, S., A. Sung, A. Abraham, V. Ramos, 2006. Intrusion Detection Systems Using Adaptive Regression Spines. Enterprise Information Systems VI: 211-218.
-
(2006)
Enterprise Information Systems VI
, pp. 211-218
-
-
Mukkamala, S.1
Sung, A.2
Abraham, A.3
Ramos, V.4
-
18
-
-
24044475779
-
Intrusion detection using ensemble of soft computing paradigms
-
Intelligent systems design and applications, advances in soft computing. Germany: Springer Verlag
-
Mukkamala, S., A. Sung, A. Abraham, 2003. Intrusion detection using ensemble of soft computing paradigms. In: Third international conference on intelligent systems design and applications. Intelligent systems design and applications, advances in soft computing. Germany: Springer Verlag, pp: 239-48.
-
(2003)
Third international conference on intelligent systems design and applications
, pp. 239-248
-
-
Mukkamala, S.1
Sung, A.2
Abraham, A.3
-
19
-
-
84908885774
-
Using the bees algorithm to schedule jobs for a machine
-
Pham, D.T., E. Koc, J. Lee, J. Phrueksanant, 2007a. Using the bees algorithm to schedule jobs for a machine. In:Proceedings of eighth international conference on lasermetrology, CMMandmachine tool performance, pp: 430-439.
-
(2007)
Proceedings of eighth international conference on lasermetrology, CMMandmachine tool performance
, pp. 430-439
-
-
Pham, D.T.1
Koc, E.2
Lee, J.3
Phrueksanant, J.4
-
20
-
-
71049125845
-
Data clustering using the bees algorithm
-
Pham, D.T., S. Otri, A.A. Afify, M. Mahmuddin, H. Al-Jabbouli, 2007d. Data clustering using the bees algorithm. In: Proceedings of 40th CIRP international manufacturing systems seminar.
-
(2007)
Proceedings of 40th CIRP international manufacturing systems seminar
-
-
Pham, D.T.1
Otri, S.2
Afify, A.A.3
Mahmuddin, M.4
Al-Jabbouli, H.5
-
21
-
-
55849151255
-
Application of the bees algorithm to the training of radialbasis function networks for control chart pattern recognition
-
Ischia, Italy
-
Pham, D.T., A. Ghanbarzadeh, E. Koc, S. Otri, 2006a. Application of the bees algorithm to the training of radialbasis function networks for control chart pattern recognition. In: Proceedings of 5th CIRP international seminar on intelligent computation in manufacturing engineering (CIRP ICME '06), Ischia, Italy, pp: 711-716.
-
(2006)
Proceedings of 5th CIRP international seminar on intelligent computation in manufacturing engineering (CIRP ICME '06)
, pp. 711-716
-
-
Pham, D.T.1
Ghanbarzadeh, A.2
Koc, E.3
Otri, S.4
-
22
-
-
84882827108
-
The bees algorithm-a novel tool for complex optimisation problems
-
Cardiff, UK
-
Pham, D.T., A. Ghanbarzadeh, E. Koc, S. Otri, S. Rahim, M. Zaidi, 2006b. The bees algorithm-a novel tool for complex optimisation problems. In: Proceedings of IPROMS 2006 conference, Cardiff, UK, pp:454-461.
-
(2006)
Proceedings of IPROMS 2006 conference
, pp. 454-461
-
-
Pham, D.T.1
Ghanbarzadeh, A.2
Koc, E.3
Otri, S.4
Rahim, S.5
Zaidi, M.6
-
23
-
-
84865986724
-
The feature selection and intrusion detection problems
-
Proceedings of Third SIAM Conference on Data Mining, San Francisco pp
-
Sung, A., S. Mukkamala, 2005. The feature selection and intrusion detection problems. Advances in Computer Science-ASIAN 2004.Proceedings of Third SIAM Conference on Data Mining, San Francisco, pp: 3192-3193.
-
(2005)
Advances in Computer Science-ASIAN 2004
, pp. 3192-3193
-
-
Sung, A.1
Mukkamala, S.2
-
25
-
-
28444485027
-
An efficient network intrusion detection method based on information theory and genetic algorithm
-
24th IEEE International
-
Xia, T., G. Qu, S. Hariri, M. Yousif, 2005. An efficient network intrusion detection method based on information theory and genetic algorithm. Performance, Computing, and Communications Conference, 2005. IPCCC 2005. 24th IEEE International, pp: 11-17.
-
(2005)
Performance, Computing, and Communications Conference, 2005. IPCCC 2005
, pp. 11-17
-
-
Xia, T.1
Qu, G.2
Hariri, S.3
Yousif, M.4
-
26
-
-
34547576241
-
Feature Selection Using Rough Set in Intrusion Detection
-
2006 IEEE Region 10 Conference
-
Zainal, A., M.A. Maarof, S.M. Shamsuddin, 2006. Feature Selection Using Rough Set in Intrusion Detection. TENCON 2006. 2006 IEEE Region 10 Conference, pp: 1-4.
-
(2006)
TENCON 2006
, pp. 1-4
-
-
Zainal, A.1
Maarof, M.A.2
Shamsuddin, S.M.3
-
28
-
-
70449445893
-
Application of support vector machines on network abnormal intrusion detection
-
Zhang Kun, Cao Hong-Xin, Yan Han, 2006. Application of support vector machines on network abnormal intrusion detection. Application Research of computers, 5: 98-100.
-
(2006)
Application Research of computers
, vol.5
, pp. 98-100
-
-
Kun, Z.1
Hong-Xin, C.2
Han, Y.3
|