-
1
-
-
41749107387
-
AdaBoost-based algorithm for network intrusion detection
-
April
-
W. Hu, S. Maybank and W. Hu. AdaBoost-Based Algorithm for Network Intrusion Detection. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, 38(2): 577-583, April 2008.
-
(2008)
IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics
, vol.38
, Issue.2
, pp. 577-583
-
-
Hu, W.1
Maybank, S.2
Hu, W.3
-
2
-
-
78651547976
-
Anomaly detection analysis of intrusion data using supervised and unsupervised approach
-
February
-
P. Gogoi, B. Borah and D. K. Bhattacharyya. Anomaly Detection Analysis of Intrusion Data Using Supervised and Unsupervised Approach. JCIT, 5(1):95-110, February 2010.
-
(2010)
JCIT
, vol.5
, Issue.1
, pp. 95-110
-
-
Gogoi, P.1
Borah, B.2
Bhattacharyya, D.K.3
-
3
-
-
75149176174
-
Ensemble-based classifiers
-
February
-
L. Rokach. Ensemble-based classifiers. Artificial Intelligence Review, 33(1-2):1-39, February 2010.
-
(2010)
Artificial Intelligence Review
, vol.33
, Issue.1-2
, pp. 1-39
-
-
Rokach, L.1
-
4
-
-
33748611921
-
Ensemble based systems in decision making
-
R. Polikar. Ensemble Based Systems in Decision Making. IEEE Circuits and System Magazines, 6(3):21-45, 2006.
-
(2006)
IEEE Circuits and System Magazines
, vol.6
, Issue.3
, pp. 21-45
-
-
Polikar, R.1
-
6
-
-
0025448521
-
The strength of weak learnability
-
June
-
R. E. Schapire. The strength of weak learnability. Machine Learning, 5(2):197-227, June 1990.
-
(1990)
Machine Learning
, vol.5
, Issue.2
, pp. 197-227
-
-
Schapire, R.E.1
-
8
-
-
0026692226
-
Stacked generalization
-
D. H. Wolpert. Stacked generalization. Neural Networks, 5(2): 241-259, 1992.
-
(1992)
Neural Networks
, vol.5
, Issue.2
, pp. 241-259
-
-
Wolpert, D.H.1
-
9
-
-
38349006504
-
Combining heterogeneous classifiers for network intrusion detection
-
Springer
-
A. Borji. Combining Heterogeneous Classifiers for Network Intrusion Detection. Lecture Notes in Computer Science, Springer, 4846:254-260, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.4846
, pp. 254-260
-
-
Borji, A.1
-
12
-
-
78649833358
-
A new weighted ensemble model for detecting DoS attack streams
-
September
-
J. Yan, X. Yun, P. Zhang, J. Tan and L. Guo. A New Weighted Ensemble Model for Detecting DoS Attack Streams. In IEEE/WIC/ACM Int'l Conf. on WI-IAT, pages 227-230, September 2010.
-
(2010)
IEEE/WIC/ACM Int'l Conf. on WI-IAT
, pp. 227-230
-
-
Yan, J.1
Yun, X.2
Zhang, P.3
Tan, J.4
Guo, L.5
-
15
-
-
77954556689
-
Identifying important characteristics in the KDD99 intrusion detection dataset by feature selection using hybrid approach
-
April
-
N. Aruajo, R. D. Oliveira, E.W. Ferreira, A. A. Shinoda and B. Bhargava. Identifying Important Characteristics in the KDD99 Intrusion Detection Dataset by feature selection using Hybrid approach. In IEEE 17th Int'l Conf. on Telecommunications (ICT), pages 552-558, April 2010.
-
(2010)
IEEE 17th Int'l Conf. on Telecommunications (ICT)
, pp. 552-558
-
-
Aruajo, N.1
Oliveira, R.D.2
Ferreira, E.W.3
Shinoda, A.A.4
Bhargava, B.5
-
16
-
-
79851493464
-
Feature selection for effective anomaly-based intrusion detection
-
March
-
N. I. Ghali. Feature Selection for Effective Anomaly-Based Intrusion Detection. IJCSNS, 9(3):285-289, March 2009.
-
(2009)
IJCSNS
, vol.9
, Issue.3
, pp. 285-289
-
-
Ghali, N.I.1
-
18
-
-
0034830461
-
Decision templates for multiple classifier fusion: An experimental comparison
-
February
-
L. I. Kuncheva, J. C. Bezdak and R. P. W. Duin. Decision templates for multiple classifier fusion: An experimental comparison. Pattern Recognition, 34(2):299-314, February 2001.
-
(2001)
Pattern Recognition
, vol.34
, Issue.2
, pp. 299-314
-
-
Kuncheva, L.I.1
Bezdak, J.C.2
Duin, R.P.W.3
-
20
-
-
34250642066
-
-
Network Working Group, RFC 3917, October
-
J. Quittek, T. Zseby, B. Claise and S. Zander. Requirements for IP flow information export (IPFIX). Network Working Group, RFC 3917, October 2004.
-
(2004)
Requirements for IP Flow Information Export (IPFIX)
-
-
Quittek, J.1
Zseby, T.2
Claise, B.3
Zander, S.4
|