메뉴 건너뛰기




Volumn 42, Issue 6, 2012, Pages 1273-1290

Nature-inspired techniques in the context of fraud detection

Author keywords

Evolutionary computation; fraud; pattern analysis; security

Indexed keywords

AUTOMATED SYSTEMS; COMPLEX NATURE; DETECTION METHODS; FRAUD; FRAUD DETECTION; PATTERN ANALYSIS; SECURITY;

EID: 84871822129     PISSN: 10946977     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCC.2012.2215851     Document Type: Article
Times cited : (66)

References (191)
  • 1
    • 72849145202 scopus 로고    scopus 로고
    • Australian Bureau of Statistics Australian Bureau of Statistics, Canberra, Australia, Tech. Rep. 4528.0
    • Australian Bureau of Statistics. (2008). "Personal fraud, 2007,' Australian Bureau of Statistics, Canberra, Australia, Tech. Rep. 4528.0. [Online].Available:http://www.abs.gov.au/ausstats/absat.nsf/cat/4528.0
    • (2008) Personal Fraud 2007
  • 2
    • 84871844859 scopus 로고    scopus 로고
    • Internet Crime Complaint Center
    • Internet Crime Complaint Center. (2010). "IC3 2009 annual report," [Online].Available:http://www.ic3.gov/media/annualreport/2009 IC3Report.pdf
    • (2010) IC3 2009 Annual Report
  • 3
    • 84871832385 scopus 로고    scopus 로고
    • Fighting fraud
    • D. Kirk, "Fighting fraud," J. Crim. Law, vol. 72, no. 5, pp. 335-337, 2008.
    • (2008) J. Crim. Law , vol.72 , Issue.5 , pp. 335-337
    • Kirk, D.1
  • 6
    • 0036871254 scopus 로고    scopus 로고
    • Evolutionary algorithms in control systems engineering: A survey
    • DOI 10.1016/S0967-0661(02)00081-3, PII S0967066102000813
    • P. J. Fleming and R. C. Purshouse, "Evolutionary algorithms in control systems engineering: A survey," Contr. Eng. Pract., vol. 10, no. 11, pp. 1223-1241, 2002. (Pubitemid 36073055)
    • (2002) Control Engineering Practice , vol.10 , Issue.11 , pp. 1223-1241
    • Fleming, P.J.1    Purshouse, R.C.2
  • 8
    • 21044438483 scopus 로고    scopus 로고
    • Evolutionary optimization in uncertain environments - A survey
    • DOI 10.1109/TEVC.2005.846356
    • Y. Jin and J. Branke, "Evolutionary optimization in uncertain environments-A survey," IEEE Trans. Evol. Comput., vol. 9, no. 3, pp. 303-317, Jun. 2005. (Pubitemid 40871134)
    • (2005) IEEE Transactions on Evolutionary Computation , vol.9 , Issue.3 , pp. 303-317
    • Jin, Y.1    Branke, J.2
  • 9
    • 0001387704 scopus 로고
    • Classifier fitness based on accuracy
    • S. W. Wilson, "Classifier fitness based on accuracy," Evol. Comput., vol. 3, no. 2, pp. 149-175, 1995.
    • (1995) Evol. Comput , vol.3 , Issue.2 , pp. 149-175
    • Wilson, S.W.1
  • 10
    • 84868121811 scopus 로고    scopus 로고
    • A comprehensive survey of data mining-based fraud detection research
    • abs/1009.6119
    • C. Phua, V. C. S. Lee, K. Smith-Miles, and R.W. Gayler, "A comprehensive survey of data mining-based fraud detection research," CoRR, vol. abs/1009.6119, pp. 1-14, 2010.
    • (2010) CoRR , pp. 1-14
    • Phua, C.1    Lee, V.C.S.2    Smith-Miles, K.3    Gayler, R.W.4
  • 11
    • 20844458491 scopus 로고    scopus 로고
    • Mining with rarity: A unifying framework
    • G. M. Weiss, "Mining with rarity: A unifying framework," ACM SIGKDD Explor. Newslett., vol. 6, no. 1, pp. 7-19, 2004.
    • (2004) ACM SIGKDD Explor. Newslett , vol.6 , Issue.1 , pp. 7-19
    • Weiss, G.M.1
  • 13
    • 77955970556 scopus 로고    scopus 로고
    • AI approaches to fraud detection and risk management
    • T. Fawcett, I. Haimowitz, F. Provost, and S. Stolfo, "AI approaches to fraud detection and risk management," AI Mag., vol. 19, no. 2, pp. 107-108, 1998.
    • (1998) AI Mag , vol.19 , Issue.2 , pp. 107-108
    • Fawcett, T.1    Haimowitz, I.2    Provost, F.3    Stolfo, S.4
  • 14
    • 36749010766 scopus 로고    scopus 로고
    • Biologically-inspired Complex Adaptive Systems approaches to Network Intrusion Detection
    • DOI 10.1016/j.istr.2007.09.001, PII S1363412707000416
    • K. Shafi and H. A. Abbass, "Biologically-inspired complex adaptive systems approaches to network intrusion detection," Inf. Security Tech. Rep., vol. 12, no. 4, pp. 209-217, 2007. (Pubitemid 350213477)
    • (2007) Information Security Technical Report , vol.12 , Issue.4 , pp. 209-217
    • Shafi, K.1    Abbass, H.A.2
  • 17
    • 84871829676 scopus 로고    scopus 로고
    • Accounting fraud and the pricing of corporate liabilities: Structuralmodels with garbling
    • A. Baglioni and U. Cherubini, "Accounting fraud and the pricing of corporate liabilities: Structuralmodels with garbling," in SSRN eLibrary, 2007.
    • (2007) SSRN ELibrary
    • Baglioni, A.1    Cherubini, U.2
  • 18
    • 84871833305 scopus 로고    scopus 로고
    • Australian Federal Police
    • Australian Federal Police. (2010). "Internet fraud and scams," [Online]. Available:http://www.afp.gov.au/policing/e-crime/internet-fraud-and- scams.aspx
    • (2010) Internet Fraud and Scams
  • 20
    • 84871824917 scopus 로고    scopus 로고
    • BBC News BBC, London, U.K.
    • BBC News. (2009). "Spam overwhelms e-mail messages," BBC, London, U.K. [Online]. Available:http://news.bbc.co.uk/2/hi/technology/7988579. stm
    • (2009) Spam Overwhelms E-mail Messages
  • 22
    • 68549094221 scopus 로고    scopus 로고
    • Asurvey of learning-based techniques of email spam filtering
    • E. Blanzieri and A. Bryl, "Asurvey of learning-based techniques of email spam filtering," Artif. Intell. Rev., vol. 29, no. 1, pp. 63-92, 2008.
    • (2008) Artif. Intell. Rev , vol.29 , Issue.1 , pp. 63-92
    • Blanzieri, E.1    Bryl, A.2
  • 23
    • 84871835179 scopus 로고    scopus 로고
    • Symantec Press Release Symantec, CA
    • Symantec Press Release. (2010). "Symantec announces July 2010 MessageLabs intelligence report," Symantec, CA. [Online]. Available:http://www.symantec.com/about/news/release/article.jsp?prid=20100722 0 1
    • (2010) Symantec Announces July 2010 MessageLabs Intelligence Report
  • 24
    • 22544443981 scopus 로고    scopus 로고
    • A case-based technique for tracking concept drift in spam filtering
    • DOI 10.1016/j.knosys.2004.10.002, PII S0950705105000316
    • S. J. Delany, P. Cunningham, A. Tsymbal, and L. Coyle, "A case-based technique for tracking concept drift in spam filtering," Knowl.-Based Syst., vol. 18, no. 4-5, pp. 187-195, 2005. (Pubitemid 41013901)
    • (2005) Knowledge-Based Systems , vol.18 , Issue.4-5 , pp. 187-195
    • Delany, S.J.1    Cunningham, P.2    Tsymbal, A.3    Coyle, L.4
  • 25
    • 84904815605 scopus 로고    scopus 로고
    • Filtering email spam in the presence of noisy user feedback
    • D. Sculley and G. Cormack, "Filtering email spam in the presence of noisy user feedback," in Proc. 5th Email Anti-Spam Conf., 2008, pp. 1-10.
    • (2008) Proc. 5th Email Anti-Spam Conf , pp. 1-10
    • Sculley, D.1    Cormack, G.2
  • 29
    • 45749099677 scopus 로고    scopus 로고
    • CALO Project
    • CALO Project, "Enron email dataset," (2009). [Online]. Available:http://www-2.cs.cmu.edu/enron/
    • (2009) Enron Email Dataset
  • 32
    • 84871829653 scopus 로고    scopus 로고
    • Anti-Phishing Working Group
    • Anti-Phishing Working Group. (2010). "Phishing attack trends report-First quarter 2010," [Online]. Available:http://www.antiphishing. org/reports/apwg report Q1 2010.pdf
    • (2010) Phishing Attack Trends Report-First Quarter 2010
  • 34
    • 84871827350 scopus 로고
    • OEDOnline
    • OEDOnline. (1989). "phishing, n," [Online].Available:http:// dictionary. oed.com/cgi/entry/30004304
    • (1989) Phishing, N
  • 36
  • 41
    • 85071570143 scopus 로고    scopus 로고
    • Phishing website detection using particle swarm optimization
    • R. Damodaram and M. Valarmathi, "Phishing website detection using particle swarm optimization," Int. J. Comput. Sci. Security, vol. 5, no. 5, pp. 477-490, 2011.
    • (2011) Int. J. Comput. Sci. Security , vol.5 , Issue.5 , pp. 477-490
    • Damodaram, R.1    Valarmathi, M.2
  • 43
    • 33646143327 scopus 로고    scopus 로고
    • Effective protection against phishing and web spoofing
    • Communications and Multimedia Security, J. Dittmann, S. Katzenbeisser, and A. Uhl, Eds Berlin/Heidelberg, Germany: Springer-Verlag
    • R. Oppliger and S.Gajek, "Effective protection against phishing and web spoofing," in Communications and Multimedia Security, J. Dittmann, S. Katzenbeisser, and A. Uhl, Eds., (Lecture Notes in Computer Science vol. 3677) Berlin/Heidelberg, Germany: Springer-Verlag, 2005, pp. 32-41.
    • (2005) Lecture Notes in Computer Science , vol.3677 , pp. 32-41
    • Oppliger, R.1    Gajek, S.2
  • 48
    • 80053654928 scopus 로고    scopus 로고
    • J. Nazario. (2005). "Phishing corpus," [Online]. Available:http://monkey.org/jose/wiki/doku.php?id=PhishingCorpus
    • (2005) Phishing Corpus
    • Nazario, J.1
  • 49
    • 53049102892 scopus 로고    scopus 로고
    • Building network attack graph for alert causal correlation
    • S. Zhang, J. Li, X. Chen, and L. Fan, "Building network attack graph for alert causal correlation," Comput. Security, vol. 27, no. 5-6, pp. 188-196, 2008.
    • (2008) Comput. Security , vol.27 , Issue.5-6 , pp. 188-196
    • Zhang, S.1    Li, J.2    Chen, X.3    Fan, L.4
  • 54
    • 34249865012 scopus 로고    scopus 로고
    • Research on intrusion detection and response: A survey
    • P. Kabiri and A. Ghorbani, "Research on intrusion detection and response: A survey," Int. J. Netw. Security, vol. 1, no. 2, pp. 84-102, 2005.
    • (2005) Int. J. Netw. Security , vol.1 , Issue.2 , pp. 84-102
    • Kabiri, P.1    Ghorbani, A.2
  • 55
    • 73349112539 scopus 로고    scopus 로고
    • Detecting distributed denial of service attack based on multi-feature fusion
    • Security Technology Berlin/Heidelberg, Germany: Springer-Verlag
    • J. Cheng, J. Yin, Y. Liu, Z. Cai, and C.Wu, "Detecting distributed denial of service attack based on multi-feature fusion," in Security Technology, (Communications in Computer and Information Science, vol. 58). Berlin/Heidelberg, Germany: Springer-Verlag, 2009, pp. 132-139.
    • (2009) Communications in Computer and Information Science , vol.58 , pp. 132-139
    • Cheng, J.1    Yin, J.2    Liu, Y.3    Cai, Z.4    Wu, C.5
  • 56
    • 70350134739 scopus 로고    scopus 로고
    • The use of computational intelligence in intrusion detection systems: A review
    • S. X. Wu and W. Banzhaf, "The use of computational intelligence in intrusion detection systems: A review," Appl. Soft Comput., vol. 10, no. 1, pp. 1-35, 2010.
    • (2010) Appl. Soft Comput , vol.10 , Issue.1 , pp. 1-35
    • Wu, S.X.1    Banzhaf, W.2
  • 58
    • 24944472729 scopus 로고    scopus 로고
    • Analysis of three intrusion detection system benchmark datasets using machine learning algorithms
    • Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005. Proceedings
    • H. G. Kayack and N. Zincir-Heywood, "Analysis of three intrusion detection system benchmark datasets using machine learning algorithms," in Intelligence and Security Informatics, P. Kantor, G. Muresan, F. Roberts, D. D. Zeng, F.-Y. Wang, H. Chen, and R. C. Merkle, Eds., (Lecture Notes in Computer Science, vol. 3495) Berlin/Heidelberg, Germany: Springer-Verlag, 2005, pp. 362-367. (Pubitemid 41314444)
    • (2005) Lecture Notes in Computer Science , vol.3495 , pp. 362-367
    • Kayacik, H.G.1    Zincir-Heywood, N.2
  • 59
    • 50249160574 scopus 로고    scopus 로고
    • S. Stolfo et al. (2007). "KDDcup 1999 dataset," [Online].Available:http://archive.ics.uci.edu/ml/datasets/KDD+Cup+1999+Data
    • (2007) KDDcup 1999 Dataset
    • Stolfo, S.1
  • 61
    • 51849135423 scopus 로고    scopus 로고
    • A study on the feature selection of network traffic for intrusion detection purpose
    • W. Ma, D. Tran, and D. Sharma, "A study on the feature selection of network traffic for intrusion detection purpose," in Proc. Conf. Intell. Security Informat., 2008, pp. 245-247.
    • (2008) Proc. Conf. Intell. Security Informat , pp. 245-247
    • Ma, W.1    Tran, D.2    Sharma, D.3
  • 62
    • 84868695480 scopus 로고    scopus 로고
    • Unsupervised anomaly detection in network intrusion detection using clusters
    • K. Leung and C. Leckie, "Unsupervised anomaly detection in network intrusion detection using clusters," in Proc. 28th AustralasianConf.Comput. Sci, 2005, pp. 333-342.
    • (2005) Proc. 28th AustralasianConf.Comput. Sci , pp. 333-342
    • Leung, K.1    Leckie, C.2
  • 64
    • 85013615092 scopus 로고    scopus 로고
    • Enhancing network based intrusion detection for imbalanced data
    • V. Engen, J. Vincent, and K. Phalp, "Enhancing network based intrusion detection for imbalanced data," Int. J. Knowl.-Based Intell. Eng. Syst., vol. 12, no. 5-6, pp. 357-367, 2008.
    • (2008) Int. J. Knowl.-Based Intell. Eng. Syst , vol.12 , Issue.5-6 , pp. 357-367
    • Engen, V.1    Vincent, J.2    Phalp, K.3
  • 65
    • 44949222714 scopus 로고    scopus 로고
    • A hybrid artificial immune system and self organising map for network intrusion detection
    • S. T. Powers and J. He, "A hybrid artificial immune system and self organising map for network intrusion detection," Inf. Sci., vol. 178, no. 15, pp. 3024-3042, 2008.
    • (2008) Inf. Sci , vol.178 , Issue.15 , pp. 3024-3042
    • Powers, S.T.1    He, J.2
  • 66
    • 60949108490 scopus 로고    scopus 로고
    • Intrusion detection with evolutionary learning classifier systems
    • K. Shafi, T. Kovacs, H. A. Abbass, andW. Zhu, "Intrusion detection with evolutionary learning classifier systems," Nat. Comput., vol. 8, no. 1, pp. 3-27, 2009.
    • (2009) Nat. Comput , vol.8 , Issue.1 , pp. 3-27
    • Shafi, K.1    Kovacs, T.2    Abbass, H.A.3    Zhu, W.4
  • 67
    • 70350104118 scopus 로고    scopus 로고
    • An adaptive rule-based intrusion detection architecture
    • 5th Homeland Security Summit, Canberra, Australia
    • K. Shafi, H. Abbass, and W. Zhu, "An adaptive rule-based intrusion detection architecture," presented at the Security Technol. Conf., 5th Homeland Security Summit, Canberra, Australia, 2006.
    • (2006) The Security Technol. Conf.
    • Shafi, K.1    Abbass, H.2    Zhu, W.3
  • 69
    • 34547499822 scopus 로고    scopus 로고
    • An approach to spam detection by Näve Bayes ensemble based on decision induction
    • Z. Yang, X. Nie, W. Xu, and J. Guo, "An approach to spam detection by Näve Bayes ensemble based on decision induction," in Proc. 6th Int. Conf. Intell. Syst. Design Appl., 2006, pp. 861-866.
    • (2006) Proc. 6th Int. Conf. Intell. Syst. Design Appl , pp. 861-866
    • Yang, Z.1    Nie, X.2    Xu, W.3    Guo, J.4
  • 70
    • 36549012987 scopus 로고    scopus 로고
    • An evaluation of Näve Bayes variants in content-based learning for spam filtering
    • A. K. Seewald, "An evaluation of Näve Bayes variants in content-based learning for spam filtering," Intell. Data Anal., vol. 11, no. 5, pp. 497-524, 2007.
    • (2007) Intell. Data Anal , vol.11 , Issue.5 , pp. 497-524
    • Seewald, A.K.1
  • 74
    • 84870347580 scopus 로고    scopus 로고
    • Statistical machine learning for network intrusion detection: A data quality perspective
    • E. Lauria andG. Tayi, "Statistical machine learning for network intrusion detection: A data quality perspective," Int. J. Serv. Sci., vol. 1, no. 2, pp. 179-195, 2008.
    • (2008) Int. J. Serv. Sci , vol.1 , Issue.2 , pp. 179-195
    • Lauria, E.1    Tayi, G.2
  • 75
    • 44049099589 scopus 로고    scopus 로고
    • Integration of support vector machine with naïve Bayesian classifier for spam classification
    • DOI 10.1109/FSKD.2007.366, 4405998, Proceedings - Fourth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2007
    • C.-Y. Chiu and Y.-T. Huang, "Integration of support vector machine with Näve Bayesian classifier for spam classification," in Proc. 4th Int. Fuzzy Syst. Knowl. Discov. Conf., 2007, pp. 618-622. (Pubitemid 351710674)
    • (2007) Proceedings - Fourth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2007 , vol.1 , pp. 618-622
    • Chiu, C.-Y.1    Huang, Y.-T.2
  • 77
    • 26944437843 scopus 로고    scopus 로고
    • An adaptive network intrusion detection method based on PCA support vectormachines
    • Advanced Data Minning and Application Berlin, Germany: Springer
    • X. Xu and X. Wang, "An adaptive network intrusion detection method based on PCA support vectormachines," in Advanced Data Minning and Application, (Lecture Notes in Computer Science, vol. 3584). Berlin, Germany: Springer, 2005, pp. 696-703.
    • (2005) Lecture Notes in Computer Science , vol.3584 , pp. 696-703
    • Xu, X.1    Wang, X.2
  • 78
    • 24944497370 scopus 로고    scopus 로고
    • Novel questionnaire-responded transaction approach with SVM for credit card fraud detection
    • Advances in Neural Networks - ISNN 2005: Second International Symposium on Neural Networks. Proceedings
    • R. Chen, T. Chen, Y. Chien, and Y. Yang, "Novel questionnaireresponded transaction approach with SVM for credit card fraud detection," in Advances in Neural Network, (Lecture Notes in Computer Science, vol. 3497). Berlin: Springer, 2005, pp. 916-921. (Pubitemid 41314247)
    • (2005) Lecture Notes in Computer Science , vol.3497 , Issue.2 , pp. 916-921
    • Chen, R.1    Chen, T.2    Chien, Y.3    Yang, Y.4
  • 79
    • 33744516996 scopus 로고    scopus 로고
    • A new binary support vector system for increasing detection rate of credit card fraud
    • R. Chen, T. Chen, and C. Lin, "A new binary support vector system for increasing detection rate of credit card fraud," Int. J. Pattern Recognit. Artif. Intell., vol. 20, no. 2, pp. 227-240, 2006.
    • (2006) Int. J. Pattern Recognit. Artif. Intell , vol.20 , Issue.2 , pp. 227-240
    • Chen, R.1    Chen, T.2    Lin, C.3
  • 83
    • 33751538239 scopus 로고    scopus 로고
    • Detecting phishing web pages with visual similarity assessment based on Earth Mover's Distance (EMD)
    • DOI 10.1109/TDSC.2006.50
    • A. Y. Fu, L. Wenyin, and X. Deng, "Detecting phishing web pages with visual similarity assessment based on earth mover's distance (EMD)," IEEE Trans. Dependable Secure Comput., vol. 3, no. 4, pp. 301-311, Oct.-Dec. 2006. (Pubitemid 44837033)
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.4 , pp. 301-311
    • Fu, A.Y.1    Liu, W.2    Deng, X.3
  • 84
    • 84871839822 scopus 로고    scopus 로고
    • A novel visualization method for detecting DDoS network attacks
    • J. Zhang, G. Yang, L. Lu, M. Huang, and M. Che, "A novel visualization method for detecting DDoS network attacks," Vis. Inf. Commun., pp. 185-194, 2009.
    • (2009) Vis. Inf. Commun , pp. 185-194
    • Zhang, J.1    Yang, G.2    Lu, L.3    Huang, M.4    Che, M.5
  • 85
    • 33645222472 scopus 로고    scopus 로고
    • Hierarchical visualization of network intrusion detection data
    • T. Itoh, H. Takakura, A. Sawada, and K. Koyamada, "Hierarchical visualization of network intrusion detection data," IEEE Comput. Graph. Appl., vol. 26, no. 2, pp. 40-47, 2006.
    • (2006) IEEE Comput. Graph. Appl , vol.26 , Issue.2 , pp. 40-47
    • Itoh, T.1    Takakura, H.2    Sawada, A.3    Koyamada, K.4
  • 86
    • 33947572261 scopus 로고    scopus 로고
    • Learning vector quantization neural network method for network intrusion detection
    • Y. Degang, C. Guo, W. Hui, and L. Xiaofeng, "Learning vector quantization neural network method for network intrusion detection," Wuhan Univ. J. Nat. Sci., vol. 12, no. 1, pp. 147-150, 2007.
    • (2007) Wuhan Univ. J. Nat. Sci , vol.12 , Issue.1 , pp. 147-150
    • Degang, Y.1    Guo, C.2    Hui, W.3    Xiaofeng, L.4
  • 87
    • 50249150849 scopus 로고    scopus 로고
    • Using incremental mining to generate fuzzy rules for real-time network intrusion detection systems
    • M.-Y. Su, S.-C. Yeh, K.-C. Chang, and H.-F. Wei, "Using incremental mining to generate fuzzy rules for real-time network intrusion detection systems," in Proc. 22nd Int. Adv. Inf. Network. Appl. Conf., 2008, pp. 50-55.
    • (2008) Proc. 22nd Int. Adv. Inf. Network. Appl. Conf , pp. 50-55
    • Su, M.-Y.1    Yeh, S.-C.2    Chang, K.-C.3    Wei, H.-F.4
  • 91
    • 56349088762 scopus 로고    scopus 로고
    • Association rules applied to credit card fraud detection
    • D. Sanchez, M. Vila, L. Cerda, and J. Serrano, "Association rules applied to credit card fraud detection," Expert Syst. Appl., vol. 36, no. 2, Part 2, pp. 3630-3640, 2009.
    • (2009) Expert Syst. Appl , vol.36 , Issue.2 PART 2 , pp. 3630-3640
    • Sanchez, D.1    Vila, M.2    Cerda, L.3    Serrano, J.4
  • 92
    • 67349218861 scopus 로고    scopus 로고
    • Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning
    • S. Panigrahi, A.Kundu, S. Sural, andA.Majumdar, "Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning," Inf. Fusion, vol. 10, no. 4, pp. 354-363, 2009.
    • (2009) Inf. Fusion , vol.10 , Issue.4 , pp. 354-363
    • Panigrahi, S.1    Kundu, A.2    Sural, S.3    Majumdar, A.4
  • 93
    • 0042421807 scopus 로고    scopus 로고
    • Statistical fraud detection: A review
    • R. J. Bolton and D. J. Hand, "Statistical fraud detection: A review," Statist. Sci., vol. 17, no. 3, pp. 235-249, 2002.
    • (2002) Statist. Sci , vol.17 , Issue.3 , pp. 235-249
    • Bolton, R.J.1    Hand, D.J.2
  • 94
    • 0034427777 scopus 로고    scopus 로고
    • Nature-inspired computing technology and applications
    • P. Marrow, "Nature-inspired computing technology and applications," BT Technol. J., vol. 18, pp. 13-23, 2000. (Pubitemid 32871711)
    • (2000) British Telecom technology journal , vol.18 , Issue.4 , pp. 13-23
    • Marrow, P.1
  • 95
    • 70450176971 scopus 로고    scopus 로고
    • Fuzzy neural networks pattern recognition method and its application in ultrasonic detection for bonding defect of thin composite materials
    • X. Yan-hong, Z. Ze, L. Kun, and Z. Guan-ying, "Fuzzy neural networks pattern recognition method and its application in ultrasonic detection for bonding defect of thin composite materials," in Proc. IEEE Int. Conf. Autom. Logist., 2009, pp. 1345-1349.
    • (2009) Proc. IEEE Int. Conf. Autom. Logist , pp. 1345-1349
    • Yan-Hong, X.1    Ze, Z.2    Kun, L.3    Guan-Ying, Z.4
  • 98
    • 58349089446 scopus 로고    scopus 로고
    • Application of artificial neural networks in the diagnosis of urological dysfunctions
    • D. Gil, M. Johnsson, J. M. G. Chamizo, A. S. Paya, and D. R. Fernandez, "Application of artificial neural networks in the diagnosis of urological dysfunctions," Expert Syst. Appl., vol. 36, no. 3, Part 2, pp. 5754-5760, 2009.
    • (2009) Expert Syst. Appl , vol.36 , Issue.3 PART 2 , pp. 5754-5760
    • Gil, D.1    Johnsson, M.2    Chamizo, J.M.G.3    Paya, A.S.4    Fernandez, D.R.5
  • 102
    • 70350397071 scopus 로고    scopus 로고
    • An ensemble of neural networks for stock trading decision making
    • Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence New York: Springer-Verlag
    • C. Pei-Chann Chang, C. Fan, J. Lin, and C. Lai, "An ensemble of neural networks for stock trading decision making," in Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, (Lecture Notes in Computer Science vol. 5755). New York: Springer-Verlag, 2009, pp. 1-10.
    • (2009) Lecture Notes in Computer Science , vol.5755 , pp. 1-10
    • Pei-Chann Chang, C.1    Fan, C.2    Lin, J.3    Lai, C.4
  • 103
    • 44949210424 scopus 로고    scopus 로고
    • Financial time series prediction using polynomial pipelined neural networks
    • A. J. Hussain, A. Knowles, P. J. Lisboa, and W. El-Deredy, "Financial time series prediction using polynomial pipelined neural networks," Expert Syst. Appl., vol. 35, no. 3, pp. 1186-1199, 2008.
    • (2008) Expert Syst. Appl , vol.35 , Issue.3 , pp. 1186-1199
    • Hussain, A.J.1    Knowles, A.2    Lisboa, P.J.3    El-Deredy, W.4
  • 104
    • 40649127989 scopus 로고    scopus 로고
    • Design and implementation of an optimization system of spam filter rule based on neural network
    • C. Zhan, F. Zhang, and M. Zheng, "Design and implementation of an optimization system of spam filter rule based on neural network," in Proc. Int. Commun., Circuits Syst. Conf., 2007, pp. 882-886.
    • (2007) Proc. Int. Commun., Circuits Syst. Conf , pp. 882-886
    • Zhan, C.1    Zhang, F.2    Zheng, M.3
  • 106
    • 33749240206 scopus 로고    scopus 로고
    • Multi-class pattern classification using neural networks
    • DOI 10.1016/j.patcog.2006.04.041, PII S0031320306002081
    • G. Ou andY. L.Murphey, "Multi-class pattern classification using neural networks," Pattern Recognit., vol. 40, no. 1, pp. 4-18, 2007. (Pubitemid 44486283)
    • (2007) Pattern Recognition , vol.40 , Issue.1 , pp. 4-18
    • Ou, G.1    Murphey, Y.L.2
  • 109
    • 76249113732 scopus 로고    scopus 로고
    • Intrusion detection using neural networks: A grid computing based data mining approach
    • Neural Information Processing New York: Springer-Verlag
    • M. Castellano, G. Mastronardi, and G. Tarricone, "Intrusion detection using neural networks: A grid computing based data mining approach," in Neural Information Processing, (Lecture Notes in Computer Science vol. 5864). New York: Springer-Verlag, 2009, pp. 777-785.
    • (2009) Lecture Notes in Computer Science , vol.5864 , pp. 777-785
    • Castellano, M.1    Mastronardi, G.2    Tarricone, G.3
  • 112
    • 65249145330 scopus 로고    scopus 로고
    • Using genetic algorithms to select most predictive protein features
    • A. Kernytsky and B. Rost, "Using genetic algorithms to select most predictive protein features," Proteins: Struct., Funct., Bioinformat., vol. 75, no. 1, pp. 75-88, 2009.
    • (2009) Proteins: Struct., Funct., Bioinformat , vol.75 , Issue.1 , pp. 75-88
    • Kernytsky, A.1    Rost, B.2
  • 113
    • 68549134970 scopus 로고    scopus 로고
    • Pin optimal distribution of auction vehicles system: Applying price forecasting, elasticity estimation, and genetic algorithms to used-vehicle distribution
    • J. Du, L. Xie, and S. Schroeder, "Pin optimal distribution of auction vehicles system: Applying price forecasting, elasticity estimation, and genetic algorithms to used-vehicle distribution," Market. Sci., vol. 28, no. 4, pp. 637-644, 2009.
    • (2009) Market. Sci , vol.28 , Issue.4 , pp. 637-644
    • Du, J.1    Xie, L.2    Schroeder, S.3
  • 114
    • 56349092339 scopus 로고    scopus 로고
    • Feedback linearization control of a twolink robot using a multi-crossover genetic algorithm
    • J. L. Chen and W.-D. Chang, "Feedback linearization control of a twolink robot using a multi-crossover genetic algorithm," Expert Syst. Appl., vol. 36, no. 2, Part 2, pp. 4154-4159, 2009.
    • (2009) Expert Syst. Appl , vol.36 , Issue.2 PART 2 , pp. 4154-4159
    • Chen, J.L.1    Chang, W.-D.2
  • 115
    • 63349096465 scopus 로고    scopus 로고
    • Medical image segmentation using genetic algorithms
    • Mar
    • U. Maulik, "Medical image segmentation using genetic algorithms," IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 2, pp. 166-173, Mar. 2009.
    • (2009) IEEE Trans. Inf. Technol. Biomed , vol.13 , Issue.2 , pp. 166-173
    • Maulik, U.1
  • 116
    • 33644678826 scopus 로고    scopus 로고
    • A hybrid real-parameter genetic algorithm for function optimization
    • DOI 10.1016/j.aei.2005.09.001, PII S1474034605000807
    • S.-F. Hwang and R.-S. He, "A hybrid real-parameter genetic algorithm for function optimization," Adv. Eng. Informat., vol. 20, no. 1, pp. 7-21, 2006. (Pubitemid 43332808)
    • (2006) Advanced Engineering Informatics , vol.20 , Issue.1 , pp. 7-21
    • Hwang, S.-F.1    He, R.-S.2
  • 118
    • 55749107819 scopus 로고    scopus 로고
    • Multi-objective spam filtering using an evolutionary algorithm
    • J. Dudley, L. Barone, and L. While, "Multi-objective spam filtering using an evolutionary algorithm," in Proc. IEEE Congr. Evol. Comput., 2008, pp. 123-130.
    • (2008) Proc. IEEE Congr. Evol. Comput , pp. 123-130
    • Dudley, J.1    Barone, L.2    While, L.3
  • 119
    • 33750528950 scopus 로고    scopus 로고
    • Intrusion detection using a fuzzy genetics-based learning algorithm
    • DOI 10.1016/j.jnca.2005.05.002, PII S1084804505000305, Network and Information Security: A Computational Intelligence Approach
    • M. S. Abadeh, J. Habibi, and C. Lucas, "Intrusion detection using a fuzzy genetics-based learning algorithm," J. Netw. Comput. Appl., vol. 30, no. 1, pp. 414-428, 2007. (Pubitemid 44666474)
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.1 , pp. 414-428
    • Abadeh, M.S.1    Habibi, J.2    Lucas, C.3
  • 120
    • 3042514639 scopus 로고    scopus 로고
    • Fuzzy data mining and genetic algorithms applied to intrusion detection
    • S. Bridges and R. Vaughn, "Fuzzy data mining and genetic algorithms applied to intrusion detection," in Proc. 23rd Nat. Inf. Syst. Security Conf., 2000, pp. 16-19.
    • (2000) Proc. 23rd Nat. Inf. Syst. Security Conf , pp. 16-19
    • Bridges, S.1    Vaughn, R.2
  • 122
    • 0038458145 scopus 로고    scopus 로고
    • Evolving fuzzy classifiers for intrusion detection
    • J. Gomez and D. Dasgupta, "Evolving fuzzy classifiers for intrusion detection," in Proc. 2002 IEEEWorkshop Inf. Assur., 2002, vol. 6, pp. 321-323.
    • (2002) Proc. 2002 IEEEWorkshop Inf. Assur , vol.6 , pp. 321-323
    • Gomez, J.1    Dasgupta, D.2
  • 123
    • 77249174228 scopus 로고    scopus 로고
    • A survey on the application of genetic programming to classification
    • Mar.
    • P. Espejo, S. Ventura, and F. Herrera, "A survey on the application of genetic programming to classification," IEEE Trans. Syst.,Man, Cybern. C, Appl. Rev., vol. 40, no. 2, pp. 121-144, Mar. 2010.
    • (2010) IEEE Trans. Syst.,Man, Cybern. C, Appl. Rev , vol.40 , Issue.2 , pp. 121-144
    • Espejo, P.1    Ventura, S.2    Herrera, F.3
  • 125
    • 67650677051 scopus 로고    scopus 로고
    • Evolving highspeed, easy-to-understand network intrusion detection rules with genetic programming
    • Applications of Evolutionary Computing New York: Springer-Verlag
    • A. Orfila, J. M. Estevez-Tapiador, and A. Ribagorda, "Evolving highspeed, easy-to-understand network intrusion detection rules with genetic programming," in Applications of Evolutionary Computing, (Lecture Notes in Computer Science vol. 5484). New York: Springer-Verlag, 2009, pp. 93-98.
    • (2009) Lecture Notes in Computer Science , vol.5484 , pp. 93-98
    • Orfila, A.1    Estevez-Tapiador, J.M.2    Ribagorda, A.3
  • 126
    • 80052438232 scopus 로고    scopus 로고
    • Automatic rule generation based on genetic programming for event correlation
    • Computational Intelligence in Security for Information Systems New York: Springer-Verlag
    • G. Suarez-Tangil, E. Palomar, J. de Fuentes, J. Blasco, and A. Ribagorda, "Automatic rule generation based on genetic programming for event correlation," in Computational Intelligence in Security for Information Systems, (Advances in Intelligent and Soft Computing vol. 63). New York: Springer-Verlag, 2009, pp. 127-134.
    • (2009) Advances in Intelligent and Soft Computing , vol.63 , pp. 127-134
    • Suarez-Tangil, G.1    Palomar, E.2    De Fuentes, J.3    Blasco, J.4    Ribagorda, A.5
  • 127
    • 84900537680 scopus 로고    scopus 로고
    • An intrusiondetection model based on fuzzy class-association-rule mining using genetic network programming
    • Jan.
    • S. Mabu, C. Chen, N. Lu, K. Shimada, and K. Hirasawa, "An intrusiondetection model based on fuzzy class-association-rule mining using genetic network programming," IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 41, no. 1, pp. 130-139, Jan. 2011.
    • (2011) IEEE Trans. Syst., Man, Cybern. C, Appl. Rev , vol.41 , Issue.1 , pp. 130-139
    • Mabu, S.1    Chen, C.2    Lu, N.3    Shimada, K.4    Hirasawa, K.5
  • 129
    • 33846318873 scopus 로고    scopus 로고
    • Ant colony clustering and feature extraction for anomaly intrusion detection
    • Swarm Intelligence in Data Mining, A. Abraham, C. Grosan, and V. Ramos, Eds New York: Springer-Verlag
    • C.-H. Tsang and S.Kwong, "Ant colony clustering and feature extraction for anomaly intrusion detection," in Swarm Intelligence in Data Mining, A. Abraham, C. Grosan, and V. Ramos, Eds., (Studies in Computational Intelligence vol. 34) New York: Springer-Verlag, 2006, pp. 101-123.
    • (2006) Studies in Computational Intelligence , vol.34 , pp. 101-123
    • Tsang, C.-H.1    Kwong, S.2
  • 130
    • 70449984497 scopus 로고    scopus 로고
    • Discovering classification rules for email spam filtering with an ant colony optimization algorithm
    • May
    • E.-S. M. El-Alfy, "Discovering classification rules for email spam filtering with an ant colony optimization algorithm," in Proc. IEEE Congr. Evol. Comput., May 2009, pp. 1778-1783.
    • (2009) Proc. IEEE Congr. Evol. Comput. , pp. 1778-1783
    • El-Alfy, E.-S.M.1
  • 133
    • 34047197634 scopus 로고    scopus 로고
    • K-means algorithm based on particle swarm optimization algorithm for anomaly intrusion detection
    • L. Xiao, Z. Shao, and G. Liu, "K-means algorithm based on particle swarm optimization algorithm for anomaly intrusion detection," in Proc. 6th World Congr. Intell. Control Autom., 2006, vol. 2, pp. 5854-5858.
    • (2006) Proc. 6th World Congr. Intell. Control Autom , vol.2 , pp. 5854-5858
    • Xiao, L.1    Shao, Z.2    Liu, G.3
  • 135
    • 39049125213 scopus 로고    scopus 로고
    • Particle swarm optimization-aided feature selection for spam email classification
    • Sep
    • C.-C. Lai and C.-H. Wu, "Particle swarm optimization-aided feature selection for spam email classification," in Proc. 2nd Int. Innovat. Comput., Inf. Control Conf., Sep. 2007, pp. 165-168.
    • (2007) Proc. 2nd Int. Innovat. Comput., Inf. Control Conf , pp. 165-168
    • Lai, C.-C.1    Wu, C.-H.2
  • 137
    • 0000270113 scopus 로고    scopus 로고
    • Learning using an artificial immune system
    • DOI 10.1006/jnca.1996.0014
    • J. E. Hunt and D. E. Cooke, "Learning using an artificial immune system," J. Netw. Comput. Appl., vol. 19, no. 2, pp. 189-212, 1996. (Pubitemid 126412791)
    • (1996) Journal of Network and Computer Applications , vol.19 , Issue.2 , pp. 189-212
    • Hunt, J.E.1    Cooke, D.E.2
  • 138
    • 33947317430 scopus 로고    scopus 로고
    • Artificial immune system inspired behavior-based anti-spam filter
    • DOI 10.1007/s00500-006-0116-0, Web intelligence and change discovery
    • X. Yue, A. Abraham, Z. Chi, Y. Hao, and H. Mo, "Artificial immune system inspired behavior-based anti-spam filter," Soft Comput.-Fusion Found., Methodol. Appl., vol. 11, no. 8, pp. 729-740, 2007. (Pubitemid 46437686)
    • (2007) Soft Computing , vol.11 , Issue.8 , pp. 729-740
    • Yue, X.1    Abraham, A.2    Chi, Z.-X.3    Hao, Y.-Y.4    Mo, H.5
  • 139
    • 44949095515 scopus 로고    scopus 로고
    • Artificial immune system for collaborative spam filtering
    • S. Sarafijanovic and J. Le Boudec, "Artificial immune system for collaborative spam filtering," Stud. Comput. Intell., vol. 129, pp. 39-51, 2008.
    • (2008) Stud. Comput. Intell , vol.129 , pp. 39-51
    • Sarafijanovic, S.1    Le Boudec, J.2
  • 140
    • 35449005874 scopus 로고    scopus 로고
    • Immune system approaches to intrusion detection - A review
    • DOI 10.1007/s11047-006-9026-4
    • J. Kim, P. Bentley, U. Aickelin, J. Greensmith, G. Tedesco, and J. Twycross, "Immune system approaches to intrusion detection-A review," Nat. Comput., vol. 6, no. 4, pp. 413-466, 2007. (Pubitemid 47629391)
    • (2007) Natural Computing , vol.6 , Issue.4 , pp. 413-466
    • Kim, J.1    Bentley, P.J.2    Aickelin, U.3    Greensmith, J.4    Tedesco, G.5    Twycross, J.6
  • 141
    • 69849102444 scopus 로고    scopus 로고
    • Multi-agent artificial immune systems (MAAIS) for intrusion detection: Abstraction from danger theory
    • Agent and Multi-Agent Systems.: Technologies and Applications New York: Springer-Verlag
    • C.-M. Ou and C. Ou, "Multi-agent artificial immune systems (MAAIS) for intrusion detection: Abstraction from danger theory," in Agent and Multi-Agent Systems.: Technologies and Applications, (Lecture Notes in Computer Science vol. 5559). New York: Springer-Verlag, 2009, pp. 11-19.
    • (2009) Lecture Notes in Computer Science , vol.5559 , pp. 11-19
    • Ou, C.-M.1    Ou, C.2
  • 142
    • 47849133272 scopus 로고    scopus 로고
    • Intrusion detection via artificial immune system: A performance-based approach
    • Biologically-Inspired Collaborative Computin New York: Springer
    • A. Visconti, N. Fusi, and H. Tahayori, "Intrusion detection via artificial immune system: A performance-based approach," in Biologically-Inspired Collaborative Computin (IFIP International Federation for Information Processing). New York: Springer, 2008, pp. 125-135.
    • (2008) IFIP International Federation for Information Processing , pp. 125-135
    • Visconti, A.1    Fusi, N.2    Tahayori, H.3
  • 144
    • 43049174001 scopus 로고    scopus 로고
    • Increasing the accuracy of a spam-detecting artificial immune system
    • T. Oda and T. White, "Increasing the accuracy of a spam-detecting artificial immune system," in Proc. Congr. Evol. Comput., 2003, pp. 390-396.
    • (2003) Proc. Congr. Evol. Comput , pp. 390-396
    • Oda, T.1    White, T.2
  • 145
    • 26944434277 scopus 로고    scopus 로고
    • Immunity from spam: An analysis of an artificial immune system for junk email detection
    • Artificial Immune Systems: 4th International Conference, ICARIS 2005. Proceedings
    • T. Oda and T. White, "Immunity from spam: An analysis of an artificial immune system," in Proc. 4th Int. Artif. Immune Syst. Conf., 2005, pp. 276-289. (Pubitemid 41472729)
    • (2005) Lecture Notes in Computer Science , vol.3627 , pp. 276-289
    • Oda, T.1    White, T.2
  • 147
    • 34548119887 scopus 로고    scopus 로고
    • An artificial immune system-inspired multiobjective evolutionary algorithm with application to the detection of distributed computer network intrusions
    • DOI 10.1145/1274000.1274035, Proceedings of GECCO 2007: Genetic and Evolutionary Computation Conference, Companion Material
    • C. R. Haag, G. B. Lamont, P. D. Williams, and G. L. Peterson, "An artificial immune system-inspired multiobjective evolutionary algorithm with application to the detection of distributed computer network intrusions," in Proc. 2007 GECCO Conf. Compan. Genet. Evol. Comput, 2007, pp. 2717-2724. (Pubitemid 47296783)
    • (2007) Proceedings of GECCO 2007: Genetic and Evolutionary Computation Conference, Companion Material , pp. 2717-2724
    • Haag, C.R.1    Lamont, G.B.2    Williams, P.D.3    Peterson, G.L.4
  • 148
    • 55849104353 scopus 로고    scopus 로고
    • A new model of self-adaptive network intrusion detection
    • Z. Qing-hua, Y.-z. Fu, and B.-g. Xu, "A new model of self-adaptive network intrusion detection," in Proc. IEEE Congr. Evol. Comput., 2008, pp. 436-439.
    • (2008) Proc. IEEE Congr. Evol. Comput , pp. 436-439
    • Qing-Hua, Z.1    Fu, Y.-Z.2    Xu, B.-G.3
  • 150
  • 153
    • 58349100775 scopus 로고    scopus 로고
    • Using self-organizing maps with learning classifier system for intrusion detection
    • PRICAI 2008: Trends in Artificial Intelligence NewYork: Springer-Verlag
    • K. Tamee, P. Rojanavasu, S. Udomthanapong, and O. Pinngern, "Using self-organizing maps with learning classifier system for intrusion detection," in PRICAI 2008: Trends in Artificial Intelligence, (Lecture Notes in Computer Science). NewYork: Springer-Verlag, 2008, pp. 1071-1076.
    • (2008) Lecture Notes in Computer Science , pp. 1071-1076
    • Tamee, K.1    Rojanavasu, P.2    Udomthanapong, S.3    Pinngern, O.4
  • 154
  • 156
    • 71549117908 scopus 로고    scopus 로고
    • A particle swarm based hybrid system for imbalanced medical data sampling
    • P. Yang, L. Xu, B. Zhou, Z. Zhang, and A. Zomaya, "A particle swarm based hybrid system for imbalanced medical data sampling," BMC Genom., vol. 10, no. Suppl 3, 2009, pp. 1-14.
    • (2009) BMC Genom , vol.10 , Issue.SUPPL. 3 , pp. 1-14
    • Yang, P.1    Xu, L.2    Zhou, B.3    Zhang, Z.4    Zomaya, A.5
  • 157
    • 70349617264 scopus 로고    scopus 로고
    • Evolutionary undersampling for classification with imbalanced datasets: Proposals and taxonomy
    • Sep
    • S. Garća and F. Herrera, "Evolutionary undersampling for classification with imbalanced datasets: Proposals and taxonomy," Evol. Comput., vol. 17, no. 3, pp. 275-306, Sep. 2009.
    • (2009) Evol. Comput , vol.17 , Issue.3 , pp. 275-306
    • Garća, S.1    Herrera, F.2
  • 158
    • 27144549260 scopus 로고    scopus 로고
    • Editorial: Special issue on learning from imbalanced data sets
    • N. V. Chawla, N. Japkowicz, and A. Kotcz, "Editorial: Special issue on learning from imbalanced data sets," ACMSIGKDD Explorat. Newslett., vol. 6, no. 1, pp. 1-6, 2004.
    • (2004) ACMSIGKDD Explorat. Newslett , vol.6 , Issue.1 , pp. 1-6
    • Chawla, N.V.1    Japkowicz, N.2    Kotcz, A.3
  • 159
    • 35348821822 scopus 로고    scopus 로고
    • Intrusion detection in computer networks by a modular ensemble of one-class classifiers
    • DOI 10.1016/j.inffus.2006.10.002, PII S1566253506000765, Applications of Ensemble Methods
    • G. Giacinto, R. Perdisci, M. D. Rio, and F. Roli, "Intrusion detection in computer networks by a modular ensemble of one-class classifiers," Inf. Fus., vol. 9, no. 1, pp. 69-82, 2008. (Pubitemid 47589059)
    • (2008) Information Fusion , vol.9 , Issue.1 , pp. 69-82
    • Giacinto, G.1    Perdisci, R.2    Del Rio, M.3    Roli, F.4
  • 160
    • 0034825091 scopus 로고    scopus 로고
    • Supervised versus unsupervised binary-learning by feedforward neural networks
    • DOI 10.1023/A:1007660820062
    • N. Japkowicz, "Supervised versus unsupervised binary-learning by feedforward neural networks," Mach. Learn., vol. 42, pp. 97-122, 2001. (Pubitemid 32872400)
    • (2001) Machine Learning , vol.42 , Issue.1-2 , pp. 97-122
    • Japkowicz, N.1
  • 161
    • 84859001991 scopus 로고    scopus 로고
    • Developing new fitness functions in genetic programming for classification with unbalanced data
    • Apr.
    • U. Bhowan, M. Johnston, and M. Zhang, "Developing new fitness functions in genetic programming for classification with unbalanced data," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 42, no. 2, pp. 406-421, Apr. 2012.
    • (2012) IEEE Trans. Syst., Man, Cybern. B, Cybern , vol.42 , Issue.2 , pp. 406-421
    • Bhowan, U.1    Johnston, M.2    Zhang, M.3
  • 167
    • 33646420793 scopus 로고    scopus 로고
    • Usingmultiple windows to track concept drift
    • M. M. Lazarescu, S.Venkatesh, and H. H. Bui, "Usingmultiple windows to track concept drift," Intell. Data Anal., vol. 8, no. 1, pp. 29-59, 2004.
    • (2004) Intell. Data Anal , vol.8 , Issue.1 , pp. 29-59
    • Lazarescu, M.M.1    Venkatesh, S.2    Bui, H.H.3
  • 168
    • 37749050180 scopus 로고    scopus 로고
    • Dynamic weighted majority: An ensemble method for drifting concepts
    • J. Z. Kolter and M. A. Maloof, "Dynamic weighted majority: An ensemble method for drifting concepts," J. Mach. Learn. Res., vol. 8, pp. 2755-2790, 2007.
    • (2007) J. Mach. Learn. Res , vol.8 , pp. 2755-2790
    • Kolter, J.Z.1    Maloof, M.A.2
  • 170
    • 3543113272 scopus 로고    scopus 로고
    • On the impact of systematic noise on the evolutionary optimization performance-A sphere model analysis
    • H. Beyer, M. Olhofer, and B. Sendhoff, "On the impact of systematic noise on the evolutionary optimization performance-A sphere model analysis," Genet. Programm. Evol. Mach., vol. 5, no. 4, pp. 327-360, 2004.
    • (2004) Genet. Programm. Evol. Mach , vol.5 , Issue.4 , pp. 327-360
    • Beyer, H.1    Olhofer, M.2    Sendhoff, B.3
  • 171
    • 0034143132 scopus 로고    scopus 로고
    • Noise detection and elimination in data preprocessing: Experiments in medical domains
    • DOI 10.1080/088395100117124
    • D. Gamberger, N. Lavrac, and S. Dzeroski, "Noise detection and elimination in data preprocessing: Experiments in medical domains," Appl. Artif. Intell., vol. 14, no. 2, pp. 205-223, 2000. (Pubitemid 35394295)
    • (2000) Applied Artificial Intelligence , vol.14 , Issue.2 , pp. 205-223
    • Gamberger, D.1    Lavrac, N.2    Dzeroski, S.3
  • 172
    • 4344586460 scopus 로고    scopus 로고
    • Applying evolutionary algorithms to problems with noisy, time-consuming fitness functions
    • A. Di Pietro, L. While, and L. Barone, "Applying evolutionary algorithms to problems with noisy, time-consuming fitness functions," in Proc. Congr. Evol. Comput., 2004, vol. 2, pp. 1254-1261.
    • (2004) Proc. Congr. Evol. Comput , vol.2 , pp. 1254-1261
    • Di Pietro, A.1    While, L.2    Barone, L.3
  • 175
    • 34547673383 scopus 로고    scopus 로고
    • Cost-sensitive boosting for classification of imbalanced data
    • DOI 10.1016/j.patcog.2007.04.009, PII S0031320307001835
    • Y. Sun, M. S. Kamel, A. K.Wong, andY.Wang, "Cost-sensitive boosting for classification of imbalanced data," Pattern Recognit., vol. 40, no. 12, pp. 3358-3378, 2007. (Pubitemid 47223287)
    • (2007) Pattern Recognition , vol.40 , Issue.12 , pp. 3358-3378
    • Sun, Y.1    Kamel, M.S.2    Wong, A.K.C.3    Wang, Y.4
  • 176
    • 40749149223 scopus 로고    scopus 로고
    • A fast numerical algorithm for the estimation of diffusion model parameters
    • A. Voss and J. Voss, "A fast numerical algorithm for the estimation of diffusion model parameters," J. Math. Psychol., vol. 52, no. 1, pp. 1-9, 2008.
    • (2008) J. Math. Psychol , vol.52 , Issue.1 , pp. 1-9
    • Voss, A.1    Voss, J.2
  • 177
    • 45849134070 scopus 로고    scopus 로고
    • Sparse inverse covariance estimation with the graphical lasso
    • DOI 10.1093/biostatistics/kxm045
    • J. Friedman, T. Hastie, and R. Tibshirani, "Sparse inverse covariance estimation with the graphical lasso," Biostatistics, vol. 9, no. 3, pp. 432-441, 2008. (Pubitemid 351882084)
    • (2008) Biostatistics , vol.9 , Issue.3 , pp. 432-441
    • Friedman, J.1    Hastie, T.2    Tibshirani, R.3
  • 179
    • 0019533482 scopus 로고
    • Principal component analysis in linear systems - Controllability, observability, and model reduction
    • B. Moore, "Principal component analysis in linear systems: Controllability, observability, and model reduction," IEEE Trans. Automat. Control, vol. AC-26, no. 1, pp. 17-32, Feb. 1981. (Pubitemid 11495780)
    • (1981) IEEE Transactions on Automatic Control , vol.AC-26 , Issue.1 , pp. 17-32
    • Moore Bruce, C.1
  • 180
    • 84861595365 scopus 로고    scopus 로고
    • On principal component analysis for high-dimensional XCSR
    • M. Behdad, T. French, L. Barone, and M. Bennamoun, "On principal component analysis for high-dimensional XCSR," Evol. Intell., vol. 5, pp. 129-138, 2012.
    • (2012) Evol. Intell , vol.5 , pp. 129-138
    • Behdad, M.1    French, T.2    Barone, L.3    Bennamoun, M.4
  • 181
    • 57349172034 scopus 로고    scopus 로고
    • Fast rule representation for continuous attributes in genetics-based machine learning
    • J. Bacardit and N. Krasnogor, "Fast rule representation for continuous attributes in genetics-based machine learning," in Proc. 10th Annu. Genet. Evol. Comput. Conf., 2008, pp. 1421-1422.
    • (2008) Proc. 10th Annu. Genet. Evol. Comput. Conf , pp. 1421-1422
    • Bacardit, J.1    Krasnogor, N.2
  • 182
    • 43749119566 scopus 로고    scopus 로고
    • Reducing internet auction fraud
    • DOI 10.1145/1342327.1342343
    • B. Gavish and C. L. Tucci, "Reducing internet auction fraud," Commun. ACM, vol. 51, no. 5, pp. 89-97, 2008. (Pubitemid 351690942)
    • (2008) Communications of the ACM , vol.51 , Issue.5 , pp. 89-97
    • Gavish, B.1    Tucci, C.L.2
  • 183
    • 67449162055 scopus 로고    scopus 로고
    • Click fraud
    • K. C. Wilbur and Y. Zhu, "Click fraud," Market. Sci., vol. 28, no. 2, pp. 293-308, 2009.
    • (2009) Market. Sci , vol.28 , Issue.2 , pp. 293-308
    • Wilbur, K.C.1    Zhu, Y.2
  • 186
    • 33750682639 scopus 로고    scopus 로고
    • Detecting spam blogs: A machine learning approach
    • Proceedings of the 21st National Conference on Artificial Intelligence and the 18th Innovative Applications of Artificial Intelligence Conference, AAAI-06/IAAI-06
    • P. Kolari, A. Java, T. Finin, T. Oates, and A. Joshi, "Detecting spam blogs: A machine learning approach," in Proc. 21st Nat. Conf. Artif. Intell., 2006, pp. 1351-1356. (Pubitemid 44705462)
    • (2006) Proceedings of the National Conference on Artificial Intelligence , vol.2 , pp. 1351-1356
    • Kolari, P.1    Java, A.2    Finin, T.3    Oates, T.4    Joshi, A.5
  • 191
    • 33747174227 scopus 로고    scopus 로고
    • SVMs for the Blogosphere: Blog identification and splog detection
    • Computational Approaches to Analyzing Weblogs - Papers from the AAAI Spring Symposium, Technical Report
    • P. Kolari, T. Finin, and A. Joshi, "SVMs for the blogosphere: Blog identification and splog detection," in Proc. AAAI Spring Symp. Comput. Approaches Anal. Weblogs, 2006, pp. 92-99. (Pubitemid 44230534)
    • (2006) AAAI Spring Symposium - Technical Report , vol.SS-06-03 , pp. 92-99
    • Kolari, P.1    Finin, T.2    Joshi, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.