-
1
-
-
84898944587
-
Intrusion detection with neural networks
-
Michael I. Jordan, Michael J. Kearns, and Sara A. Sok Eds ., TheMITPress
-
Jake Ryan, Meng-Jang Lin, and Risto Miikkulainen, "Intrusion detection with neural networks". in Advatices in Neural Itfarniation Processing Systems, Michael I. Jordan, Michael J. Kearns, and Sara A. Sok Eds . 1998, vol. 10, pp. 943-949, TheMITPress.
-
(1998)
Advatices in Neural Itfarniation Processing Systems
, vol.10
, pp. 943-949
-
-
Ryan, J.1
Lin, M.-J.2
Miikkulainen, R.3
-
3
-
-
1842610129
-
Knowledge based neural networks for online and off-line modeling and rule extraction in bioinformatics
-
C.H. Wu and J.T.L. Wang, P.P.and Wang, Eds. March
-
Nikola Kasabov, Matthias Futschik, and Melanie Middlemiss, "Knowledge based neural networks for online and off-line modeling and rule extraction in bioinformatics", in Proc. Atlantic Synposiuni on Computational Biology, Genome lnformation System and Technology, C.H. Wu and J.T.L. Wang, P.P.and Wang, Eds., March 2001.
-
(2001)
Proc. Atlantic Synposiuni on Computational Biology, Genome Lnformation System and Technology
-
-
Kasabov, N.1
Futschik, M.2
Middlemiss, M.3
-
4
-
-
0031078007
-
Feature selection: Evaluation, application, and small sample performance
-
February
-
Anil Jain and Douglas Zongker, "Feature selection: Evaluation, application, and small sample performance", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 2, pp. 153-158, February 1997.
-
(1997)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.19
, Issue.2
, pp. 153-158
-
-
Jain, A.1
Zongker, D.2
-
5
-
-
0002105307
-
A hybrid genetic algorithm for classification
-
Ray Myopoulos, John; Reiter, Ed. Sydney, Australia, August, Morgan Kaufmann
-
J. Kelly Jr. and L. Davis, "A hybrid genetic algorithm for classification", in Proceedings of tlw 12th Intematiorinl Joint Conference on Artificial lntelligeiice, Ray Myopoulos, John; Reiter, Ed., Sydney, Australia, August 1991, pp. 645-450, Morgan Kaufmann.
-
(1991)
Proceedings of the 12th Intematiorinl Joint Conference on Artificial Lntelligeiice
, pp. 450-645
-
-
Kelly Jr., J.1
Davis, L.2
-
6
-
-
0003065528
-
Further research on feature selection and classification using genetic algorithms
-
Stephanie Forrest, Ed. San Mateo, CA, USA, July 1993, Morgan Kaufmann
-
W. E Punch, E. D. Goodman, Min Pei, Lai Chia-Shun, P. Hovland. and R. Enhody, "Further research on feature selection and classification using genetic algorithms", in Proceedings of the 5th lnternational Conference on Getietic Algorithms, Stephanie Forrest, Ed., San Mateo, CA, USA, July 1993, pp. 557-564, Morgan Kaufmann.
-
Proceedings of the 5th Lnternational Conference on Getietic Algorithms
, pp. 557-564
-
-
Punch, W.E.1
Goodman, E.D.2
Pei, M.3
Chia-Shun, L.4
Hovland, P.5
Enhody, R.6
-
7
-
-
0141548578
-
Simultaneous feature scaling and selection using a masking genetic-algorithm
-
Thomas Back, Ed. San Francisco, July, Morgan Kaufmann
-
M. Raymer, W. Punch, E. Goodman, P. Sanschagrin, and L. Kuhn, "Simultaneous feature scaling and selection using a masking genetic-algorithm", in Proceedirigs of the 7th International Conference on Genetic Algorithms, Thomas Back, Ed., San Francisco, July 1997, pp. 561-567, Morgan Kaufmann.
-
(1997)
Proceedirigs of the 7th International Conference on Genetic Algorithms
, pp. 561-567
-
-
Raymer, M.1
Punch, W.2
Goodman, E.3
Sanschagrin, P.4
Kuhn, L.5
-
8
-
-
0034227313
-
Dimensionality reduction using genetic algorithms
-
July
-
M. L. Raymer, W. F. Punch, E. D. Goodman, L. A. Kuhn. and A. K. Jain, "Dimensionality reduction using genetic algorithms", IEEE-EC, vol. 4, no. 2, pp. 164, July 2000.
-
(2000)
IEEE-EC
, vol.4
, Issue.2
, pp. 164
-
-
Raymer, M.L.1
Punch, W.F.2
Goodman, E.D.3
Kuhn, L.A.4
Jain, A.K.5
-
9
-
-
4344580864
-
Feature extraction using genetic algorithms
-
Hong Kong, October
-
M. Pei, E.D. Goodman, and W.F. Punch, "Feature extraction using genetic algorithms", in Proceedings of the International Symposiun on lntelligent Data Engineering arid Learning (IDEAL'98), Hong Kong, October 1998, pp. 371-384.
-
(1998)
Proceedings of the International Symposiun on Intelligent Data Engineering Arid Learning (IDEAL'98)
, pp. 371-384
-
-
Pei, M.1
Goodman, E.D.2
Punch, W.F.3
-
10
-
-
33845310391
-
Genetic algorithm optimized feature transformation A comparison with different classifiers
-
E. Cantu-Paz, J. A. Foster, K. Deb, D. Davis, R. Roy, U.-M. O'Reilly, H.-G. Beyer, R. Standish, G. Kendall, S. Wilson, M. Harman, J. Wegener, D. Dasgupta, M. A. Potter. A. C. Schultz, K. Dows1and.N. Jonoska, and J. Miller, Eds. Chicago. 12-16 July, vol. 2724 0f LNCS, Springer-Verlag
-
Z. Huang, M. Pei, E. Goodman, Y. Huang, and G. Li, "Genetic algorithm optimized feature transformation A comparison with different classifiers", in Genetic arid Evolutionary Computation - GECCO-2003, E. Cantu-Paz, J. A. Foster, K. Deb, D. Davis, R. Roy, U.-M. O'Reilly, H.-G. Beyer, R. Standish, G. Kendall, S. Wilson, M. Harman, J. Wegener, D. Dasgupta, M. A. Potter. A. C. Schultz, K. Dows1and.N. Jonoska, and J. Miller, Eds., Chicago. 12-16 July 2003. vol. 2724 0f LNCS, pp2121-2133, Springer-Verlag.
-
(2003)
Genetic Arid Evolutionary Computation - GECCO-2003
, pp. 2121-2133
-
-
Huang, Z.1
Pei, M.2
Goodman, E.3
Huang, Y.4
Li, G.5
-
11
-
-
0029359427
-
A genetic approach for selection of (near-) optimal suhsets of principal components for discrimination
-
M. Prakash and M. Narasimha Murty. "A genetic approach for selection of (near-) optimal suhsets of principal components for discrimination". Patteni Recognition Letters, vol. 16, no. 8, pp. 781-787, 1995.
-
(1995)
Patteni Recognition Letters
, vol.16
, Issue.8
, pp. 781-787
-
-
Prakash, M.1
Murty, M.N.2
-
12
-
-
85084160262
-
Using text categorization techniques for intrusion detection
-
Berkeley, CA, USA, August 5-9, USENIX Association
-
Y. Liao and V. Rao Vemuri, "Using text categorization techniques for intrusion detection", in Proceedings of the 11th USENIX Security Symposium (SECURITY- 02). Berkeley, CA, USA, August 5-9 2002, pp. 51- 60, USENIX Association.
-
(2002)
Proceedings of the 11th USENIX Security Symposium (SECURITY- 02)
, pp. 51-60
-
-
Liao, Y.1
Vemuri, V.R.2
-
13
-
-
0036321445
-
Use of K-nearest neighhor classifier for intrusion detection
-
Y. Liao and V. Rao Vemuri, "Use of K-nearest neighhor classifier for intrusion detection", Computers & Securig, vol. 21, no. 5, pp. 419-448.2002.
-
(2002)
Computers & Securig
, vol.21
, Issue.5
, pp. 419-448
-
-
Liao, Y.1
Vemuri, V.R.2
-
14
-
-
0003555184
-
-
Ed., IEEE Computer Society Press, Los Alamitos, Calif. Washington
-
Belur V. Dasarathy, Ed., Nearest neighbor(NN) norms : riri pattern class$catiori techniques, IEEE Computer Society Press, Los Alamitos, Calif. Washington, 1991.
-
(1991)
Nearest Neighbor(NN) Norms : Riri Pattern Class$catiori Techniques
-
-
Dasarathy, B.V.1
-
15
-
-
84875961249
-
-
The UCI KDD Archive, Information and Computer Science, Irvine, Last accessed: 7/7/03
-
The UCI KDD Archive, Information and Computer Science, University of California, Irvine, "Kdd cup 1999 data set http://kdd.ics.uci.edu/ datahases/kddcup99/kddcup9Y.html", Last accessed: 7/7/03.
-
Kdd Cup 1999 Data Set
-
-
-
16
-
-
0003993827
-
-
Last accessed: 7/7/03
-
MIT Lincoln Laboratory, "Darpa intrusion detection evaluation http://www.ll.mit.edu/ist/ideval/index.html, Last accessed: 7/7/03.
-
Darpa Intrusion Detection Evaluation
-
-
-
17
-
-
84962238645
-
Cost-based modeling for fraud and intrusion detection: Results from the JAM project
-
IEEE Computer Press
-
Salvatore Stolfo, Wenke Lee, Andreas Prodromidis, and Philip Chan, "Cost-based modeling for fraud and intrusion detection: Results from the JAM project", in Proc. DA RPA lriforniarion Survivabilih Conference arid Exposirion. 2000, vol. 11, pp. 1130-1144, IEEE Computer Press.
-
(2000)
Proc. da RPA Lriforniarion Survivabilih Conference Arid Exposirion
, vol.11
, pp. 1130-1144
-
-
Stolfo, S.1
Lee, W.2
Prodromidis, A.3
Chan, P.4
-
18
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
Wenke Lee, Salvatore J. Stolfo, and Kui W. Mok, "'A data mining framework for building intrusion detection models", in IEEE Simposium on Securig and Privacy, 1999, pp. 120-132.
-
(1999)
IEEE Simposium on Securig and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
|