-
1
-
-
72849145202
-
-
Australian Bureau of Statistics Australian Bureau of Statistics, Canberra, Australia, Tech. Rep. 4528.0
-
Australian Bureau of Statistics. (2008). "Personal fraud, 2007,' Australian Bureau of Statistics, Canberra, Australia, Tech. Rep. 4528.0. [Online].Available:http://www.abs.gov.au/ausstats/absat.nsf/cat/4528.0
-
(2008)
Personal Fraud 2007
-
-
-
2
-
-
84871844859
-
-
Internet Crime Complaint Center
-
Internet Crime Complaint Center. (2010). "IC3 2009 annual report," [Online].Available:http://www.ic3.gov/media/annualreport/2009 IC3Report.pdf
-
(2010)
IC3 2009 Annual Report
-
-
-
3
-
-
84871832385
-
Fighting fraud
-
D. Kirk, "Fighting fraud," J. Crim. Law, vol. 72, no. 5, pp. 335-337, 2008.
-
(2008)
J. Crim. Law
, vol.72
, Issue.5
, pp. 335-337
-
-
Kirk, D.1
-
6
-
-
0036871254
-
Evolutionary algorithms in control systems engineering: A survey
-
DOI 10.1016/S0967-0661(02)00081-3, PII S0967066102000813
-
P. J. Fleming and R. C. Purshouse, "Evolutionary algorithms in control systems engineering: A survey," Contr. Eng. Pract., vol. 10, no. 11, pp. 1223-1241, 2002. (Pubitemid 36073055)
-
(2002)
Control Engineering Practice
, vol.10
, Issue.11
, pp. 1223-1241
-
-
Fleming, P.J.1
Purshouse, R.C.2
-
7
-
-
0345690133
-
Evolutionary algorithm based offline/online path planner for UAV navigation
-
Dec
-
I. Nikolos, K. Valavanis, N. Tsourveloudis, and A. Kostaras, "Evolutionary algorithm based offline/online path planner for UAV navigation," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 33, no. 6, pp. 898-912, Dec. 2003.
-
(2003)
IEEE Trans. Syst., Man, Cybern. B, Cybern
, vol.33
, Issue.6
, pp. 898-912
-
-
Nikolos, I.1
Valavanis, K.2
Tsourveloudis, N.3
Kostaras, A.4
-
8
-
-
21044438483
-
Evolutionary optimization in uncertain environments - A survey
-
DOI 10.1109/TEVC.2005.846356
-
Y. Jin and J. Branke, "Evolutionary optimization in uncertain environments-A survey," IEEE Trans. Evol. Comput., vol. 9, no. 3, pp. 303-317, Jun. 2005. (Pubitemid 40871134)
-
(2005)
IEEE Transactions on Evolutionary Computation
, vol.9
, Issue.3
, pp. 303-317
-
-
Jin, Y.1
Branke, J.2
-
9
-
-
0001387704
-
Classifier fitness based on accuracy
-
S. W. Wilson, "Classifier fitness based on accuracy," Evol. Comput., vol. 3, no. 2, pp. 149-175, 1995.
-
(1995)
Evol. Comput
, vol.3
, Issue.2
, pp. 149-175
-
-
Wilson, S.W.1
-
10
-
-
84868121811
-
A comprehensive survey of data mining-based fraud detection research
-
abs/1009.6119
-
C. Phua, V. C. S. Lee, K. Smith-Miles, and R.W. Gayler, "A comprehensive survey of data mining-based fraud detection research," CoRR, vol. abs/1009.6119, pp. 1-14, 2010.
-
(2010)
CoRR
, pp. 1-14
-
-
Phua, C.1
Lee, V.C.S.2
Smith-Miles, K.3
Gayler, R.W.4
-
11
-
-
20844458491
-
Mining with rarity: A unifying framework
-
G. M. Weiss, "Mining with rarity: A unifying framework," ACM SIGKDD Explor. Newslett., vol. 6, no. 1, pp. 7-19, 2004.
-
(2004)
ACM SIGKDD Explor. Newslett
, vol.6
, Issue.1
, pp. 7-19
-
-
Weiss, G.M.1
-
12
-
-
33646848433
-
A game-theoretic approach to credit card fraud detection
-
DOI 10.1007/11593980-20, Information Systems Security - First International Conference, ICISS 2005, Proceedings
-
V. Vatsa, S. Sural, and A. Majumdar, "A game-theoretic approach to credit card fraud detection," in Information Systems Securit, (Lecture Notes in Computer Science vol. 3803). New York: Springer, 2005, pp. 263-276. (Pubitemid 43775413)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3803
, pp. 263-276
-
-
Vatsa, V.1
Sural, S.2
Majumdar, A.K.3
-
13
-
-
77955970556
-
AI approaches to fraud detection and risk management
-
T. Fawcett, I. Haimowitz, F. Provost, and S. Stolfo, "AI approaches to fraud detection and risk management," AI Mag., vol. 19, no. 2, pp. 107-108, 1998.
-
(1998)
AI Mag
, vol.19
, Issue.2
, pp. 107-108
-
-
Fawcett, T.1
Haimowitz, I.2
Provost, F.3
Stolfo, S.4
-
14
-
-
36749010766
-
Biologically-inspired Complex Adaptive Systems approaches to Network Intrusion Detection
-
DOI 10.1016/j.istr.2007.09.001, PII S1363412707000416
-
K. Shafi and H. A. Abbass, "Biologically-inspired complex adaptive systems approaches to network intrusion detection," Inf. Security Tech. Rep., vol. 12, no. 4, pp. 209-217, 2007. (Pubitemid 350213477)
-
(2007)
Information Security Technical Report
, vol.12
, Issue.4
, pp. 209-217
-
-
Shafi, K.1
Abbass, H.A.2
-
15
-
-
27144474379
-
-
Illinois Genetic Algorithms Lab., Univ. Illinois Urbana-Champaign, Tech. Rep. 2004031
-
H. A. Abbass, J. Bacardit, M. V. Butz, and X. Llor̀a, "Online adaptation in learning classifier systems: Stream data mining," Illinois Genetic Algorithms Lab., Univ. Illinois Urbana-Champaign, Tech. Rep. 2004031, 2004.
-
(2004)
Online Adaptation in Learning Classifier Systems: Stream Data Mining
-
-
Abbass, H.A.1
Bacardit, J.2
Butz, M.V.3
Llor̀a, X.4
-
17
-
-
84871829676
-
Accounting fraud and the pricing of corporate liabilities: Structuralmodels with garbling
-
A. Baglioni and U. Cherubini, "Accounting fraud and the pricing of corporate liabilities: Structuralmodels with garbling," in SSRN eLibrary, 2007.
-
(2007)
SSRN ELibrary
-
-
Baglioni, A.1
Cherubini, U.2
-
18
-
-
84871833305
-
-
Australian Federal Police
-
Australian Federal Police. (2010). "Internet fraud and scams," [Online]. Available:http://www.afp.gov.au/policing/e-crime/internet-fraud-and- scams.aspx
-
(2010)
Internet Fraud and Scams
-
-
-
20
-
-
84871824917
-
-
BBC News BBC, London, U.K.
-
BBC News. (2009). "Spam overwhelms e-mail messages," BBC, London, U.K. [Online]. Available:http://news.bbc.co.uk/2/hi/technology/7988579. stm
-
(2009)
Spam Overwhelms E-mail Messages
-
-
-
22
-
-
68549094221
-
Asurvey of learning-based techniques of email spam filtering
-
E. Blanzieri and A. Bryl, "Asurvey of learning-based techniques of email spam filtering," Artif. Intell. Rev., vol. 29, no. 1, pp. 63-92, 2008.
-
(2008)
Artif. Intell. Rev
, vol.29
, Issue.1
, pp. 63-92
-
-
Blanzieri, E.1
Bryl, A.2
-
23
-
-
84871835179
-
-
Symantec Press Release Symantec, CA
-
Symantec Press Release. (2010). "Symantec announces July 2010 MessageLabs intelligence report," Symantec, CA. [Online]. Available:http://www.symantec.com/about/news/release/article.jsp?prid=20100722 0 1
-
(2010)
Symantec Announces July 2010 MessageLabs Intelligence Report
-
-
-
24
-
-
22544443981
-
A case-based technique for tracking concept drift in spam filtering
-
DOI 10.1016/j.knosys.2004.10.002, PII S0950705105000316
-
S. J. Delany, P. Cunningham, A. Tsymbal, and L. Coyle, "A case-based technique for tracking concept drift in spam filtering," Knowl.-Based Syst., vol. 18, no. 4-5, pp. 187-195, 2005. (Pubitemid 41013901)
-
(2005)
Knowledge-Based Systems
, vol.18
, Issue.4-5
, pp. 187-195
-
-
Delany, S.J.1
Cunningham, P.2
Tsymbal, A.3
Coyle, L.4
-
25
-
-
84904815605
-
Filtering email spam in the presence of noisy user feedback
-
D. Sculley and G. Cormack, "Filtering email spam in the presence of noisy user feedback," in Proc. 5th Email Anti-Spam Conf., 2008, pp. 1-10.
-
(2008)
Proc. 5th Email Anti-Spam Conf
, pp. 1-10
-
-
Sculley, D.1
Cormack, G.2
-
27
-
-
3843075559
-
An evaluation of naive Bayesian anti-spam filtering
-
I. Androutsopoulos, J. Koutsias, K. Chandrinos, G. Paliouras, and C. Spyropoulos, "An evaluation of naive Bayesian anti-spam filtering," in Proc. Workshop Mach. Learn. New Inf. Age, 2000, pp. 9-17.
-
(2000)
Proc. Workshop Mach. Learn. New Inf. Age
, pp. 9-17
-
-
Androutsopoulos, I.1
Koutsias, J.2
Chandrinos, K.3
Paliouras, G.4
Spyropoulos, C.5
-
28
-
-
33845807843
-
Spam filtering using statistical data compression models
-
A. Bratko, B. Filipic, G. Cormack, T. Lynam, and B. Zupan, "Spam filtering using statistical data compression models," J. Mach. Learn. Res., vol. 7, pp. 2673-2698, 2006. (Pubitemid 46011492)
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 2673-2698
-
-
Bratko, A.1
Filipic, B.2
Cormack, G.V.3
Lynam, T.R.4
Zupan, B.5
-
29
-
-
45749099677
-
-
CALO Project
-
CALO Project, "Enron email dataset," (2009). [Online]. Available:http://www-2.cs.cmu.edu/enron/
-
(2009)
Enron Email Dataset
-
-
-
31
-
-
84904809957
-
Spam filtering with naive Bayes-Which naive bayes?
-
V. Metsis, I. Androutsopoulos, and G. Paliouras, "Spam filtering with naive Bayes-Which naive bayes?," in Proc. 3rd Email Anti-Spam Conf., 2006, pp. 125-134.
-
(2006)
Proc. 3rd Email Anti-Spam Conf
, pp. 125-134
-
-
Metsis, V.1
Androutsopoulos, I.2
Paliouras, G.3
-
32
-
-
84871829653
-
-
Anti-Phishing Working Group
-
Anti-Phishing Working Group. (2010). "Phishing attack trends report-First quarter 2010," [Online]. Available:http://www.antiphishing. org/reports/apwg report Q1 2010.pdf
-
(2010)
Phishing Attack Trends Report-First Quarter 2010
-
-
-
33
-
-
48649093956
-
Security usability principles for vulnerability analysis and risk assessment
-
A. Josang, B. AlFayyadh, T. Grandison, M. AlZomai, and J.McNamara, "Security usability principles for vulnerability analysis and risk assessment," in Proc. 23rd Annu. Comput. Security Appl. Conf., 2007, pp. 269-278.
-
(2007)
Proc. 23rd Annu. Comput. Security Appl. Conf
, pp. 269-278
-
-
Josang, A.1
Alfayyadh, B.2
Grandison, T.3
Alzomai, M.4
McNamara, J.5
-
34
-
-
84871827350
-
-
OEDOnline
-
OEDOnline. (1989). "phishing, n," [Online].Available:http:// dictionary. oed.com/cgi/entry/30004304
-
(1989)
Phishing, N
-
-
-
35
-
-
33745816410
-
Why phishing works
-
CHI 2006: Conference on Human Factors in Computing Systems, Conference Proceedings SIGCHI
-
R. Dhamija, J. D. Tygar, andM. Hearst, "Why phishing works," in Proc. SIGCHI Conf. Human Factors Comput. Syst., 2006, pp. 581-590. (Pubitemid 44032146)
-
(2006)
Conference on Human Factors in Computing Systems - Proceedings
, vol.1
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
36
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
CHI 2006: Conference on Human Factors in Computing Systems, Conference Proceedings SIGCHI
-
M. Wu, R. C. Miller, and S. L. Garfinkel, "Do security toolbars actually prevent phishing attacks?," in Proc. SIGCHI Conf. Human Factors Comput. Syst., 2006, pp. 601-610. (Pubitemid 44032148)
-
(2006)
Conference on Human Factors in Computing Systems - Proceedings
, vol.1
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
37
-
-
67249090254
-
Phishing E-mail detection based on structural properties
-
M. Chandrasekaran, K. Narayanan, and S. Upadhyaya, "Phishing E-mail detection based on structural properties," in Proc. 1st Annu. Symp. Inf. Assur.: Intrus. Detect. Prevent., 2006, pp. 2-8.
-
(2006)
Proc. 1st Annu. Symp. Inf. Assur.: Intrus. Detect. Prevent
, pp. 2-8
-
-
Chandrasekaran, M.1
Narayanan, K.2
Upadhyaya, S.3
-
38
-
-
35348913799
-
Learning to detect phishing emails
-
DOI 10.1145/1242572.1242660, 16th International World Wide Web Conference, WWW2007
-
I. Fette, N. Sadeh, and A. Tomasic, "Learning to detect phishing emails," in Proc. 16th Int. World Wide Web Conf., 2007, pp. 649-656. (Pubitemid 47582294)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 649-656
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
39
-
-
84871842042
-
A framework for predicting phishing websites using neural networks
-
A. Martin, N. B. Anutthamaa, M. Sathyavathy, M. M. S. Francois, and V. P. Venkatesan, "A framework for predicting phishing websites using neural networks," Int. J. Comput. Sci. Issues, vol. 8, pp. 330-336, 2011.
-
(2011)
Int. J. Comput. Sci. Issues
, vol.8
, pp. 330-336
-
-
Martin, A.1
Anutthamaa, N.B.2
Sathyavathy, M.3
Francois, M.M.S.4
Venkatesan, V.P.5
-
41
-
-
85071570143
-
Phishing website detection using particle swarm optimization
-
R. Damodaram and M. Valarmathi, "Phishing website detection using particle swarm optimization," Int. J. Comput. Sci. Security, vol. 5, no. 5, pp. 477-490, 2011.
-
(2011)
Int. J. Comput. Sci. Security
, vol.5
, Issue.5
, pp. 477-490
-
-
Damodaram, R.1
Valarmathi, M.2
-
42
-
-
71149108237
-
Identifying suspicious URLs:An application of large-scale online learning
-
J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, "Identifying suspicious URLs:An application of large-scale online learning," in Proc. 26th Annu. Int. Mach. Learn., Conf., 2009, pp. 681-688.
-
(2009)
Proc. 26th Annu. Int. Mach. Learn., Conf
, pp. 681-688
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
43
-
-
33646143327
-
Effective protection against phishing and web spoofing
-
Communications and Multimedia Security, J. Dittmann, S. Katzenbeisser, and A. Uhl, Eds Berlin/Heidelberg, Germany: Springer-Verlag
-
R. Oppliger and S.Gajek, "Effective protection against phishing and web spoofing," in Communications and Multimedia Security, J. Dittmann, S. Katzenbeisser, and A. Uhl, Eds., (Lecture Notes in Computer Science vol. 3677) Berlin/Heidelberg, Germany: Springer-Verlag, 2005, pp. 32-41.
-
(2005)
Lecture Notes in Computer Science
, vol.3677
, pp. 32-41
-
-
Oppliger, R.1
Gajek, S.2
-
44
-
-
70449646963
-
Online phishing classification using adversarial data mining and signaling games
-
G. L'Huillier, R. Weber, and N. Figueroa, "Online phishing classification using adversarial data mining and signaling games," in Proc. ACM SIGKDD Workshop Cyber Security Intell. Informat., 2009, pp. 33-42.
-
(2009)
Proc. ACM SIGKDD Workshop Cyber Security Intell. Informat
, pp. 33-42
-
-
L'Huillier, G.1
Weber, R.2
Figueroa, N.3
-
46
-
-
72449167296
-
A comparison of machine learning techniques for phishing detection
-
S. Abu-Nimeh, D. Nappa, X. Wang, and S. Nair, "A comparison of machine learning techniques for phishing detection," in Proc. Anti-Phishing Working Groups 2nd Annu. eCrime Researchers Summit, 2007, pp. 60-69.
-
(2007)
Proc. Anti-Phishing Working Groups 2nd Annu. ECrime Researchers Summit
, pp. 60-69
-
-
Abu-Nimeh, S.1
Nappa, D.2
Wang, X.3
Nair, S.4
-
48
-
-
80053654928
-
-
J. Nazario. (2005). "Phishing corpus," [Online]. Available:http://monkey.org/jose/wiki/doku.php?id=PhishingCorpus
-
(2005)
Phishing Corpus
-
-
Nazario, J.1
-
49
-
-
53049102892
-
Building network attack graph for alert causal correlation
-
S. Zhang, J. Li, X. Chen, and L. Fan, "Building network attack graph for alert causal correlation," Comput. Security, vol. 27, no. 5-6, pp. 188-196, 2008.
-
(2008)
Comput. Security
, vol.27
, Issue.5-6
, pp. 188-196
-
-
Zhang, S.1
Li, J.2
Chen, X.3
Fan, L.4
-
52
-
-
27844484884
-
Intrusion detection: A survey
-
A. Lazarevic, V. Kumar, and J. Srivastava, "Intrusion detection: A survey," in Proc. Manag. Cyber Threats, 2005, pp. 19-78.
-
(2005)
Proc. Manag. Cyber Threats
, pp. 19-78
-
-
Lazarevic, A.1
Kumar, V.2
Srivastava, J.3
-
54
-
-
34249865012
-
Research on intrusion detection and response: A survey
-
P. Kabiri and A. Ghorbani, "Research on intrusion detection and response: A survey," Int. J. Netw. Security, vol. 1, no. 2, pp. 84-102, 2005.
-
(2005)
Int. J. Netw. Security
, vol.1
, Issue.2
, pp. 84-102
-
-
Kabiri, P.1
Ghorbani, A.2
-
55
-
-
73349112539
-
Detecting distributed denial of service attack based on multi-feature fusion
-
Security Technology Berlin/Heidelberg, Germany: Springer-Verlag
-
J. Cheng, J. Yin, Y. Liu, Z. Cai, and C.Wu, "Detecting distributed denial of service attack based on multi-feature fusion," in Security Technology, (Communications in Computer and Information Science, vol. 58). Berlin/Heidelberg, Germany: Springer-Verlag, 2009, pp. 132-139.
-
(2009)
Communications in Computer and Information Science
, vol.58
, pp. 132-139
-
-
Cheng, J.1
Yin, J.2
Liu, Y.3
Cai, Z.4
Wu, C.5
-
56
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: A review
-
S. X. Wu and W. Banzhaf, "The use of computational intelligence in intrusion detection systems: A review," Appl. Soft Comput., vol. 10, no. 1, pp. 1-35, 2010.
-
(2010)
Appl. Soft Comput
, vol.10
, Issue.1
, pp. 1-35
-
-
Wu, S.X.1
Banzhaf, W.2
-
57
-
-
78650760342
-
Peer to peer botnet detection for cyber-security: A data mining approach
-
M. M. Masud, J. Gao, L. Khan, J. Han, and B. Thuraisingham, "Peer to peer botnet detection for cyber-security: A data mining approach," in Proc. 4th Annu. Workshop Cyber Security Inf. Intell. Res., 2008, pp. 1-2.
-
(2008)
Proc. 4th Annu. Workshop Cyber Security Inf. Intell. Res
, pp. 1-2
-
-
Masud, M.M.1
Gao, J.2
Khan, L.3
Han, J.4
Thuraisingham, B.5
-
58
-
-
24944472729
-
Analysis of three intrusion detection system benchmark datasets using machine learning algorithms
-
Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005. Proceedings
-
H. G. Kayack and N. Zincir-Heywood, "Analysis of three intrusion detection system benchmark datasets using machine learning algorithms," in Intelligence and Security Informatics, P. Kantor, G. Muresan, F. Roberts, D. D. Zeng, F.-Y. Wang, H. Chen, and R. C. Merkle, Eds., (Lecture Notes in Computer Science, vol. 3495) Berlin/Heidelberg, Germany: Springer-Verlag, 2005, pp. 362-367. (Pubitemid 41314444)
-
(2005)
Lecture Notes in Computer Science
, vol.3495
, pp. 362-367
-
-
Kayacik, H.G.1
Zincir-Heywood, N.2
-
59
-
-
50249160574
-
-
S. Stolfo et al. (2007). "KDDcup 1999 dataset," [Online].Available:http://archive.ics.uci.edu/ml/datasets/KDD+Cup+1999+Data
-
(2007)
KDDcup 1999 Dataset
-
-
Stolfo, S.1
-
60
-
-
33646390798
-
Genetic algorithm to improve SVM based network intrusion detection system
-
DOI 10.1109/AINA.2005.191, 1423667, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005
-
D. S. Kim, H.-N. Nguyen, and J. S. Park, "Genetic algorithm to improve SVM based network intrusion detection system," in Proc. 19th Int. Conf. Adv. Inf. Network. Appl., 2005, vol. 2, pp. 155-158. (Pubitemid 43804002)
-
(2005)
Proceedings - International Conference on Advanced Information Networking and Applications, AINA
, vol.2
, pp. 155-158
-
-
Kim, D.S.1
Nguyen, H.-N.2
Park, J.S.3
-
61
-
-
51849135423
-
A study on the feature selection of network traffic for intrusion detection purpose
-
W. Ma, D. Tran, and D. Sharma, "A study on the feature selection of network traffic for intrusion detection purpose," in Proc. Conf. Intell. Security Informat., 2008, pp. 245-247.
-
(2008)
Proc. Conf. Intell. Security Informat
, pp. 245-247
-
-
Ma, W.1
Tran, D.2
Sharma, D.3
-
62
-
-
84868695480
-
Unsupervised anomaly detection in network intrusion detection using clusters
-
K. Leung and C. Leckie, "Unsupervised anomaly detection in network intrusion detection using clusters," in Proc. 28th AustralasianConf.Comput. Sci, 2005, pp. 333-342.
-
(2005)
Proc. 28th AustralasianConf.Comput. Sci
, pp. 333-342
-
-
Leung, K.1
Leckie, C.2
-
63
-
-
2442424268
-
Näve Bayes vs decision trees in intrusion detection systems
-
N. B. Amor, S. Benferhat, and Z. Elouedi, "Näve Bayes vs decision trees in intrusion detection systems," in Proc. 2004 ACM Symp. Appl. Comput., 2004, pp. 420-424.
-
(2004)
Proc. 2004 ACM Symp. Appl. Comput
, pp. 420-424
-
-
Amor, N.B.1
Benferhat, S.2
Elouedi, Z.3
-
64
-
-
85013615092
-
Enhancing network based intrusion detection for imbalanced data
-
V. Engen, J. Vincent, and K. Phalp, "Enhancing network based intrusion detection for imbalanced data," Int. J. Knowl.-Based Intell. Eng. Syst., vol. 12, no. 5-6, pp. 357-367, 2008.
-
(2008)
Int. J. Knowl.-Based Intell. Eng. Syst
, vol.12
, Issue.5-6
, pp. 357-367
-
-
Engen, V.1
Vincent, J.2
Phalp, K.3
-
65
-
-
44949222714
-
A hybrid artificial immune system and self organising map for network intrusion detection
-
S. T. Powers and J. He, "A hybrid artificial immune system and self organising map for network intrusion detection," Inf. Sci., vol. 178, no. 15, pp. 3024-3042, 2008.
-
(2008)
Inf. Sci
, vol.178
, Issue.15
, pp. 3024-3042
-
-
Powers, S.T.1
He, J.2
-
66
-
-
60949108490
-
Intrusion detection with evolutionary learning classifier systems
-
K. Shafi, T. Kovacs, H. A. Abbass, andW. Zhu, "Intrusion detection with evolutionary learning classifier systems," Nat. Comput., vol. 8, no. 1, pp. 3-27, 2009.
-
(2009)
Nat. Comput
, vol.8
, Issue.1
, pp. 3-27
-
-
Shafi, K.1
Kovacs, T.2
Abbass, H.A.3
Zhu, W.4
-
67
-
-
70350104118
-
An adaptive rule-based intrusion detection architecture
-
5th Homeland Security Summit, Canberra, Australia
-
K. Shafi, H. Abbass, and W. Zhu, "An adaptive rule-based intrusion detection architecture," presented at the Security Technol. Conf., 5th Homeland Security Summit, Canberra, Australia, 2006.
-
(2006)
The Security Technol. Conf.
-
-
Shafi, K.1
Abbass, H.2
Zhu, W.3
-
68
-
-
33751353738
-
The role of early stopping and population size in XCS for intrusion detection
-
Simulated Evolution and Learning - 6th International Conference, SEAL 2006, Proceedings
-
K. Shafi, H. A. Abbass, and W. Zhu, "The role of early stopping and population size in xcs for intrusion detection," in Simulated Evolution and Learning, (Lecture Notes in Computer Science vol. 4247). Berlin, Germany: Springer, 2006, pp. 50-57. (Pubitemid 44812320)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4247
, pp. 50-57
-
-
Shafi, K.1
Abbass, H.A.2
Zhu, W.3
-
69
-
-
34547499822
-
An approach to spam detection by Näve Bayes ensemble based on decision induction
-
Z. Yang, X. Nie, W. Xu, and J. Guo, "An approach to spam detection by Näve Bayes ensemble based on decision induction," in Proc. 6th Int. Conf. Intell. Syst. Design Appl., 2006, pp. 861-866.
-
(2006)
Proc. 6th Int. Conf. Intell. Syst. Design Appl
, pp. 861-866
-
-
Yang, Z.1
Nie, X.2
Xu, W.3
Guo, J.4
-
70
-
-
36549012987
-
An evaluation of Näve Bayes variants in content-based learning for spam filtering
-
A. K. Seewald, "An evaluation of Näve Bayes variants in content-based learning for spam filtering," Intell. Data Anal., vol. 11, no. 5, pp. 497-524, 2007.
-
(2007)
Intell. Data Anal
, vol.11
, Issue.5
, pp. 497-524
-
-
Seewald, A.K.1
-
72
-
-
49049086544
-
Bayesian additive regression trees-based spam detection for enhanced email privacy
-
S. Abu-Nimeh, D. Nappa, X. Wang, and S. Nair, "Bayesian additive regression trees-based spam detection for enhanced email privacy," in Proc. 3rd Int. Avail., Reliabil. Security Conf., 2008, pp. 1044-1051.
-
(2008)
Proc. 3rd Int. Avail., Reliabil. Security Conf
, pp. 1044-1051
-
-
Abu-Nimeh, S.1
Nappa, D.2
Wang, X.3
Nair, S.4
-
73
-
-
50249130793
-
A probabilistic approach for network intrusion detection
-
K.-C. Khor, C.-Y. Ting, and S.-P. Amnuaisuk, "A probabilistic approach for network intrusion detection," in Proc. 2008 2nd Asia Int. Conf. Modell. Simul., 2008, pp. 463-468.
-
(2008)
Proc. 2008 2nd Asia Int. Conf. Modell. Simul
, pp. 463-468
-
-
Khor, K.-C.1
Ting, C.-Y.2
Amnuaisuk, S.-P.3
-
74
-
-
84870347580
-
Statistical machine learning for network intrusion detection: A data quality perspective
-
E. Lauria andG. Tayi, "Statistical machine learning for network intrusion detection: A data quality perspective," Int. J. Serv. Sci., vol. 1, no. 2, pp. 179-195, 2008.
-
(2008)
Int. J. Serv. Sci
, vol.1
, Issue.2
, pp. 179-195
-
-
Lauria, E.1
Tayi, G.2
-
75
-
-
44049099589
-
Integration of support vector machine with naïve Bayesian classifier for spam classification
-
DOI 10.1109/FSKD.2007.366, 4405998, Proceedings - Fourth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2007
-
C.-Y. Chiu and Y.-T. Huang, "Integration of support vector machine with Näve Bayesian classifier for spam classification," in Proc. 4th Int. Fuzzy Syst. Knowl. Discov. Conf., 2007, pp. 618-622. (Pubitemid 351710674)
-
(2007)
Proceedings - Fourth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2007
, vol.1
, pp. 618-622
-
-
Chiu, C.-Y.1
Huang, Y.-T.2
-
76
-
-
36448963754
-
Relaxed online SVMs for spam filtering
-
DOI 10.1145/1277741.1277813, Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR'07
-
D. Sculley and G. M. Wachman, "Relaxed online SVMs for spam filtering," in Proc. 30th Annu. Int. ACM SIGIR Conf. Res. Development Inf. Retrieval, 2007, pp. 415-422. (Pubitemid 350164988)
-
(2007)
Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR'07
, pp. 415-422
-
-
Sculley, D.1
Wachman, G.M.2
-
77
-
-
26944437843
-
An adaptive network intrusion detection method based on PCA support vectormachines
-
Advanced Data Minning and Application Berlin, Germany: Springer
-
X. Xu and X. Wang, "An adaptive network intrusion detection method based on PCA support vectormachines," in Advanced Data Minning and Application, (Lecture Notes in Computer Science, vol. 3584). Berlin, Germany: Springer, 2005, pp. 696-703.
-
(2005)
Lecture Notes in Computer Science
, vol.3584
, pp. 696-703
-
-
Xu, X.1
Wang, X.2
-
78
-
-
24944497370
-
Novel questionnaire-responded transaction approach with SVM for credit card fraud detection
-
Advances in Neural Networks - ISNN 2005: Second International Symposium on Neural Networks. Proceedings
-
R. Chen, T. Chen, Y. Chien, and Y. Yang, "Novel questionnaireresponded transaction approach with SVM for credit card fraud detection," in Advances in Neural Network, (Lecture Notes in Computer Science, vol. 3497). Berlin: Springer, 2005, pp. 916-921. (Pubitemid 41314247)
-
(2005)
Lecture Notes in Computer Science
, vol.3497
, Issue.2
, pp. 916-921
-
-
Chen, R.1
Chen, T.2
Chien, Y.3
Yang, Y.4
-
79
-
-
33744516996
-
A new binary support vector system for increasing detection rate of credit card fraud
-
R. Chen, T. Chen, and C. Lin, "A new binary support vector system for increasing detection rate of credit card fraud," Int. J. Pattern Recognit. Artif. Intell., vol. 20, no. 2, pp. 227-240, 2006.
-
(2006)
Int. J. Pattern Recognit. Artif. Intell
, vol.20
, Issue.2
, pp. 227-240
-
-
Chen, R.1
Chen, T.2
Lin, C.3
-
80
-
-
33749256984
-
Using visual features for anti-spam filtering
-
DOI 10.1109/ICIP.2005.1530440, 1530440, IEEE International Conference on Image Processing 2005, ICIP 2005
-
C.-T. Wu, K.-T. Cheng, Q. Zhu, and Y.-L. Wu, "Using visual features for anti-spam filtering," in Proc. Int. Conf. Image Process., 2005, vol. 3, pp. 509-512. (Pubitemid 44479528)
-
(2005)
Proceedings - International Conference on Image Processing, ICIP
, vol.3
, pp. 509-512
-
-
Wu, C.-T.1
Cheng, K.-T.2
Zhu, Q.3
Wu, Y.-L.4
-
81
-
-
57349173529
-
Detecting image spam using visual features and near duplicate detection
-
B. Mehta, S. Nangia, M. Gupta, and W. Nejdl, "Detecting image spam using visual features and near duplicate detection," in Proc. 17th Int. Conf. World Wide Web, 2008, pp. 497-506.
-
(2008)
Proc. 17th Int. Conf. World Wide Web
, pp. 497-506
-
-
Mehta, B.1
Nangia, S.2
Gupta, M.3
Nejdl, W.4
-
82
-
-
77953070493
-
Detection of phishing webpages based on visual similarity
-
L. Wenyin, G. Huang, L. Xiaoyue, Z. Min, and X. Deng, "Detection of phishing webpages based on visual similarity," in Proc. 14th Int. Conf. World Wide Web, 2005, pp. 1060-1061.
-
(2005)
Proc. 14th Int. Conf. World Wide Web
, pp. 1060-1061
-
-
Wenyin, L.1
Huang, G.2
Xiaoyue, L.3
Min, Z.4
Deng, X.5
-
83
-
-
33751538239
-
Detecting phishing web pages with visual similarity assessment based on Earth Mover's Distance (EMD)
-
DOI 10.1109/TDSC.2006.50
-
A. Y. Fu, L. Wenyin, and X. Deng, "Detecting phishing web pages with visual similarity assessment based on earth mover's distance (EMD)," IEEE Trans. Dependable Secure Comput., vol. 3, no. 4, pp. 301-311, Oct.-Dec. 2006. (Pubitemid 44837033)
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 301-311
-
-
Fu, A.Y.1
Liu, W.2
Deng, X.3
-
84
-
-
84871839822
-
A novel visualization method for detecting DDoS network attacks
-
J. Zhang, G. Yang, L. Lu, M. Huang, and M. Che, "A novel visualization method for detecting DDoS network attacks," Vis. Inf. Commun., pp. 185-194, 2009.
-
(2009)
Vis. Inf. Commun
, pp. 185-194
-
-
Zhang, J.1
Yang, G.2
Lu, L.3
Huang, M.4
Che, M.5
-
85
-
-
33645222472
-
Hierarchical visualization of network intrusion detection data
-
T. Itoh, H. Takakura, A. Sawada, and K. Koyamada, "Hierarchical visualization of network intrusion detection data," IEEE Comput. Graph. Appl., vol. 26, no. 2, pp. 40-47, 2006.
-
(2006)
IEEE Comput. Graph. Appl
, vol.26
, Issue.2
, pp. 40-47
-
-
Itoh, T.1
Takakura, H.2
Sawada, A.3
Koyamada, K.4
-
86
-
-
33947572261
-
Learning vector quantization neural network method for network intrusion detection
-
Y. Degang, C. Guo, W. Hui, and L. Xiaofeng, "Learning vector quantization neural network method for network intrusion detection," Wuhan Univ. J. Nat. Sci., vol. 12, no. 1, pp. 147-150, 2007.
-
(2007)
Wuhan Univ. J. Nat. Sci
, vol.12
, Issue.1
, pp. 147-150
-
-
Degang, Y.1
Guo, C.2
Hui, W.3
Xiaofeng, L.4
-
87
-
-
50249150849
-
Using incremental mining to generate fuzzy rules for real-time network intrusion detection systems
-
M.-Y. Su, S.-C. Yeh, K.-C. Chang, and H.-F. Wei, "Using incremental mining to generate fuzzy rules for real-time network intrusion detection systems," in Proc. 22nd Int. Adv. Inf. Network. Appl. Conf., 2008, pp. 50-55.
-
(2008)
Proc. 22nd Int. Adv. Inf. Network. Appl. Conf
, pp. 50-55
-
-
Su, M.-Y.1
Yeh, S.-C.2
Chang, K.-C.3
Wei, H.-F.4
-
88
-
-
84899941508
-
Multi-agent approach to network intrusion detection
-
M. Rehak, M. Pechoucek, P. Celeda, V. Krmicek,M. Grill, and K. Bartos, "Multi-agent approach to network intrusion detection," in Proc. 7th Int. Joint Auton. Agents Multiagent Syst. Conf., 2008, pp. 1695-1696.
-
(2008)
Proc. 7th Int. Joint Auton. Agents Multiagent Syst. Conf
, pp. 1695-1696
-
-
Rehak, M.1
Pechoucek, M.2
Celeda, P.3
Krmicek, V.4
Grill, M.5
Bartos, K.6
-
89
-
-
41749107387
-
AdaBoost-based algorithm for network intrusion detection
-
DOI 10.1109/TSMCB.2007.914695
-
W. Hu,W. Hu, and S.Maybank, "Adaboost-based algorithm for network intrusion detection," IEEE Trans. Syst.,Man, Cybern. B,Cybern., vol. 38, no. 2, pp. 577-583, Apr. 2008. (Pubitemid 351484757)
-
(2008)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.38
, Issue.2
, pp. 577-583
-
-
Hu, W.1
Hu, W.2
Maybank, S.3
-
90
-
-
39049142137
-
Credit card fraud detection using Hidden Markov Model
-
DOI 10.1109/TDSC.2007.70228
-
A. Srivastava, A. Kundu, S. Sural, and A. Majumdar, "Credit card fraud detection using hiddenMarkov model," IEEE Trans. Dependable Secure Comput., vol. 5, no. 1, pp. 37-48, Jan.-Mar. 2008. (Pubitemid 351239531)
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.1
, pp. 37-48
-
-
Srivastava, A.1
Kundu, A.2
Sural, S.3
Majumdar, A.K.4
-
91
-
-
56349088762
-
Association rules applied to credit card fraud detection
-
D. Sanchez, M. Vila, L. Cerda, and J. Serrano, "Association rules applied to credit card fraud detection," Expert Syst. Appl., vol. 36, no. 2, Part 2, pp. 3630-3640, 2009.
-
(2009)
Expert Syst. Appl
, vol.36
, Issue.2 PART 2
, pp. 3630-3640
-
-
Sanchez, D.1
Vila, M.2
Cerda, L.3
Serrano, J.4
-
92
-
-
67349218861
-
Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning
-
S. Panigrahi, A.Kundu, S. Sural, andA.Majumdar, "Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning," Inf. Fusion, vol. 10, no. 4, pp. 354-363, 2009.
-
(2009)
Inf. Fusion
, vol.10
, Issue.4
, pp. 354-363
-
-
Panigrahi, S.1
Kundu, A.2
Sural, S.3
Majumdar, A.4
-
93
-
-
0042421807
-
Statistical fraud detection: A review
-
R. J. Bolton and D. J. Hand, "Statistical fraud detection: A review," Statist. Sci., vol. 17, no. 3, pp. 235-249, 2002.
-
(2002)
Statist. Sci
, vol.17
, Issue.3
, pp. 235-249
-
-
Bolton, R.J.1
Hand, D.J.2
-
94
-
-
0034427777
-
Nature-inspired computing technology and applications
-
P. Marrow, "Nature-inspired computing technology and applications," BT Technol. J., vol. 18, pp. 13-23, 2000. (Pubitemid 32871711)
-
(2000)
British Telecom technology journal
, vol.18
, Issue.4
, pp. 13-23
-
-
Marrow, P.1
-
95
-
-
70450176971
-
Fuzzy neural networks pattern recognition method and its application in ultrasonic detection for bonding defect of thin composite materials
-
X. Yan-hong, Z. Ze, L. Kun, and Z. Guan-ying, "Fuzzy neural networks pattern recognition method and its application in ultrasonic detection for bonding defect of thin composite materials," in Proc. IEEE Int. Conf. Autom. Logist., 2009, pp. 1345-1349.
-
(2009)
Proc. IEEE Int. Conf. Autom. Logist
, pp. 1345-1349
-
-
Yan-Hong, X.1
Ze, Z.2
Kun, L.3
Guan-Ying, Z.4
-
97
-
-
65149098009
-
Construct an approximation decision model of medical record by neural networks-The ophthalmology department as an example
-
New York: Springer-Verlag
-
Y. Lin, C. Fan, C. Huang, and C. Fan, "Construct an approximation decision model of medical record by neural networks-The ophthalmology department as an example," in New Advances in Intelligent Decision Technologies: Results of the First KES International Symposium IDT 2009. New York: Springer-Verlag, 2009, pp. 467-480.
-
(2009)
New Advances in Intelligent Decision Technologies: Results of the First KES International Symposium IDT 2009
, pp. 467-480
-
-
Lin, Y.1
Fan, C.2
Huang, C.3
Fan, C.4
-
98
-
-
58349089446
-
Application of artificial neural networks in the diagnosis of urological dysfunctions
-
D. Gil, M. Johnsson, J. M. G. Chamizo, A. S. Paya, and D. R. Fernandez, "Application of artificial neural networks in the diagnosis of urological dysfunctions," Expert Syst. Appl., vol. 36, no. 3, Part 2, pp. 5754-5760, 2009.
-
(2009)
Expert Syst. Appl
, vol.36
, Issue.3 PART 2
, pp. 5754-5760
-
-
Gil, D.1
Johnsson, M.2
Chamizo, J.M.G.3
Paya, A.S.4
Fernandez, D.R.5
-
102
-
-
70350397071
-
An ensemble of neural networks for stock trading decision making
-
Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence New York: Springer-Verlag
-
C. Pei-Chann Chang, C. Fan, J. Lin, and C. Lai, "An ensemble of neural networks for stock trading decision making," in Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, (Lecture Notes in Computer Science vol. 5755). New York: Springer-Verlag, 2009, pp. 1-10.
-
(2009)
Lecture Notes in Computer Science
, vol.5755
, pp. 1-10
-
-
Pei-Chann Chang, C.1
Fan, C.2
Lin, J.3
Lai, C.4
-
103
-
-
44949210424
-
Financial time series prediction using polynomial pipelined neural networks
-
A. J. Hussain, A. Knowles, P. J. Lisboa, and W. El-Deredy, "Financial time series prediction using polynomial pipelined neural networks," Expert Syst. Appl., vol. 35, no. 3, pp. 1186-1199, 2008.
-
(2008)
Expert Syst. Appl
, vol.35
, Issue.3
, pp. 1186-1199
-
-
Hussain, A.J.1
Knowles, A.2
Lisboa, P.J.3
El-Deredy, W.4
-
104
-
-
40649127989
-
Design and implementation of an optimization system of spam filter rule based on neural network
-
C. Zhan, F. Zhang, and M. Zheng, "Design and implementation of an optimization system of spam filter rule based on neural network," in Proc. Int. Commun., Circuits Syst. Conf., 2007, pp. 882-886.
-
(2007)
Proc. Int. Commun., Circuits Syst. Conf
, pp. 882-886
-
-
Zhan, C.1
Zhang, F.2
Zheng, M.3
-
106
-
-
33749240206
-
Multi-class pattern classification using neural networks
-
DOI 10.1016/j.patcog.2006.04.041, PII S0031320306002081
-
G. Ou andY. L.Murphey, "Multi-class pattern classification using neural networks," Pattern Recognit., vol. 40, no. 1, pp. 4-18, 2007. (Pubitemid 44486283)
-
(2007)
Pattern Recognition
, vol.40
, Issue.1
, pp. 4-18
-
-
Ou, G.1
Murphey, Y.L.2
-
107
-
-
52149096461
-
Network intrusion detection by using cellular neural network with tabu search
-
Z. Yang, A. Karahoca, N. Yang, and N. Aydin, "Network intrusion detection by using cellular neural network with tabu search," in Proc. 2008 Bio-Inspired, Learn. Intell. Syst. Security, 2008, pp. 64-68.
-
(2008)
Proc. 2008 Bio-Inspired, Learn. Intell. Syst. Security
, pp. 64-68
-
-
Yang, Z.1
Karahoca, A.2
Yang, N.3
Aydin, N.4
-
108
-
-
69949108683
-
Network intrusion detection with workflow feature definition using bp neural network
-
Y. Wang, D. Gu, W. Li, H. Li, and J. Li, "Network intrusion detection with workflow feature definition using bp neural network," in Proc. 6th Int. Symp. Neural Netw. Adv. Neural Netw., 2009, pp. 60-67.
-
(2009)
Proc. 6th Int. Symp. Neural Netw. Adv. Neural Netw
, pp. 60-67
-
-
Wang, Y.1
Gu, D.2
Li, W.3
Li, H.4
Li, J.5
-
109
-
-
76249113732
-
Intrusion detection using neural networks: A grid computing based data mining approach
-
Neural Information Processing New York: Springer-Verlag
-
M. Castellano, G. Mastronardi, and G. Tarricone, "Intrusion detection using neural networks: A grid computing based data mining approach," in Neural Information Processing, (Lecture Notes in Computer Science vol. 5864). New York: Springer-Verlag, 2009, pp. 777-785.
-
(2009)
Lecture Notes in Computer Science
, vol.5864
, pp. 777-785
-
-
Castellano, M.1
Mastronardi, G.2
Tarricone, G.3
-
112
-
-
65249145330
-
Using genetic algorithms to select most predictive protein features
-
A. Kernytsky and B. Rost, "Using genetic algorithms to select most predictive protein features," Proteins: Struct., Funct., Bioinformat., vol. 75, no. 1, pp. 75-88, 2009.
-
(2009)
Proteins: Struct., Funct., Bioinformat
, vol.75
, Issue.1
, pp. 75-88
-
-
Kernytsky, A.1
Rost, B.2
-
113
-
-
68549134970
-
Pin optimal distribution of auction vehicles system: Applying price forecasting, elasticity estimation, and genetic algorithms to used-vehicle distribution
-
J. Du, L. Xie, and S. Schroeder, "Pin optimal distribution of auction vehicles system: Applying price forecasting, elasticity estimation, and genetic algorithms to used-vehicle distribution," Market. Sci., vol. 28, no. 4, pp. 637-644, 2009.
-
(2009)
Market. Sci
, vol.28
, Issue.4
, pp. 637-644
-
-
Du, J.1
Xie, L.2
Schroeder, S.3
-
114
-
-
56349092339
-
Feedback linearization control of a twolink robot using a multi-crossover genetic algorithm
-
J. L. Chen and W.-D. Chang, "Feedback linearization control of a twolink robot using a multi-crossover genetic algorithm," Expert Syst. Appl., vol. 36, no. 2, Part 2, pp. 4154-4159, 2009.
-
(2009)
Expert Syst. Appl
, vol.36
, Issue.2 PART 2
, pp. 4154-4159
-
-
Chen, J.L.1
Chang, W.-D.2
-
115
-
-
63349096465
-
Medical image segmentation using genetic algorithms
-
Mar
-
U. Maulik, "Medical image segmentation using genetic algorithms," IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 2, pp. 166-173, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Technol. Biomed
, vol.13
, Issue.2
, pp. 166-173
-
-
Maulik, U.1
-
116
-
-
33644678826
-
A hybrid real-parameter genetic algorithm for function optimization
-
DOI 10.1016/j.aei.2005.09.001, PII S1474034605000807
-
S.-F. Hwang and R.-S. He, "A hybrid real-parameter genetic algorithm for function optimization," Adv. Eng. Informat., vol. 20, no. 1, pp. 7-21, 2006. (Pubitemid 43332808)
-
(2006)
Advanced Engineering Informatics
, vol.20
, Issue.1
, pp. 7-21
-
-
Hwang, S.-F.1
He, R.-S.2
-
117
-
-
33750942996
-
Adaptive spam mail filtering using genetic algorithm
-
1625609, 8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings
-
U. Sanpakdee, A.Walairacht, and S.Walairacht, "Adaptive spammail filtering using genetic algorithm," in Proc. 8th Int. Adv. Commun. Technol. Conf., 2006, vol. 1, pp. 441-445. (Pubitemid 44732840)
-
(2006)
8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings
, vol.1
, pp. 441-445
-
-
Sanpakdee, U.1
Walairacht, A.2
Walairacht, S.3
-
118
-
-
55749107819
-
Multi-objective spam filtering using an evolutionary algorithm
-
J. Dudley, L. Barone, and L. While, "Multi-objective spam filtering using an evolutionary algorithm," in Proc. IEEE Congr. Evol. Comput., 2008, pp. 123-130.
-
(2008)
Proc. IEEE Congr. Evol. Comput
, pp. 123-130
-
-
Dudley, J.1
Barone, L.2
While, L.3
-
119
-
-
33750528950
-
Intrusion detection using a fuzzy genetics-based learning algorithm
-
DOI 10.1016/j.jnca.2005.05.002, PII S1084804505000305, Network and Information Security: A Computational Intelligence Approach
-
M. S. Abadeh, J. Habibi, and C. Lucas, "Intrusion detection using a fuzzy genetics-based learning algorithm," J. Netw. Comput. Appl., vol. 30, no. 1, pp. 414-428, 2007. (Pubitemid 44666474)
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 414-428
-
-
Abadeh, M.S.1
Habibi, J.2
Lucas, C.3
-
120
-
-
3042514639
-
Fuzzy data mining and genetic algorithms applied to intrusion detection
-
S. Bridges and R. Vaughn, "Fuzzy data mining and genetic algorithms applied to intrusion detection," in Proc. 23rd Nat. Inf. Syst. Security Conf., 2000, pp. 16-19.
-
(2000)
Proc. 23rd Nat. Inf. Syst. Security Conf
, pp. 16-19
-
-
Bridges, S.1
Vaughn, R.2
-
121
-
-
33646851992
-
A software implementation of a genetic algorithm based approach to network intrusion detection
-
DOI 10.1109/SNPD-SAWN.2005.9, 1434896, Proceedings - Sixth Int. Conf. on Softw. Eng., Artif. Intelligence, Networking and Parallel/Distributed Computing and First ACIS Int. Workshop on Self-Assembling Wireless Networks, SNPD/SAWN 2005
-
R. H. Gong, M. Zulkernine, and P. Abolmaesumi, "A software implementation of a genetic algorithm based approach to network intrusion detection," in Proc. 6th Int. Conf. Softw. Eng., Artif. Intell., Network. Parallel/Distrib. Comput. and 1st ACIS Int.Workshop Self-Assembl.Wireless Netw., 2005, pp. 246-253. (Pubitemid 44499666)
-
(2005)
Proceedings - Sixth Int. Conf. on Softw. Eng., Artificial Intelligence, Netw. and Parallel/Distributed Computing and First ACIS Int. Workshop on Self-Assembling Wireless Netw., SNPD/SAWN 2005
, vol.2005
, pp. 246-253
-
-
Gong, R.H.1
Zulkernine, M.2
Abolmaesumi, P.3
-
122
-
-
0038458145
-
Evolving fuzzy classifiers for intrusion detection
-
J. Gomez and D. Dasgupta, "Evolving fuzzy classifiers for intrusion detection," in Proc. 2002 IEEEWorkshop Inf. Assur., 2002, vol. 6, pp. 321-323.
-
(2002)
Proc. 2002 IEEEWorkshop Inf. Assur
, vol.6
, pp. 321-323
-
-
Gomez, J.1
Dasgupta, D.2
-
123
-
-
77249174228
-
A survey on the application of genetic programming to classification
-
Mar.
-
P. Espejo, S. Ventura, and F. Herrera, "A survey on the application of genetic programming to classification," IEEE Trans. Syst.,Man, Cybern. C, Appl. Rev., vol. 40, no. 2, pp. 121-144, Mar. 2010.
-
(2010)
IEEE Trans. Syst.,Man, Cybern. C, Appl. Rev
, vol.40
, Issue.2
, pp. 121-144
-
-
Espejo, P.1
Ventura, S.2
Herrera, F.3
-
125
-
-
67650677051
-
Evolving highspeed, easy-to-understand network intrusion detection rules with genetic programming
-
Applications of Evolutionary Computing New York: Springer-Verlag
-
A. Orfila, J. M. Estevez-Tapiador, and A. Ribagorda, "Evolving highspeed, easy-to-understand network intrusion detection rules with genetic programming," in Applications of Evolutionary Computing, (Lecture Notes in Computer Science vol. 5484). New York: Springer-Verlag, 2009, pp. 93-98.
-
(2009)
Lecture Notes in Computer Science
, vol.5484
, pp. 93-98
-
-
Orfila, A.1
Estevez-Tapiador, J.M.2
Ribagorda, A.3
-
126
-
-
80052438232
-
Automatic rule generation based on genetic programming for event correlation
-
Computational Intelligence in Security for Information Systems New York: Springer-Verlag
-
G. Suarez-Tangil, E. Palomar, J. de Fuentes, J. Blasco, and A. Ribagorda, "Automatic rule generation based on genetic programming for event correlation," in Computational Intelligence in Security for Information Systems, (Advances in Intelligent and Soft Computing vol. 63). New York: Springer-Verlag, 2009, pp. 127-134.
-
(2009)
Advances in Intelligent and Soft Computing
, vol.63
, pp. 127-134
-
-
Suarez-Tangil, G.1
Palomar, E.2
De Fuentes, J.3
Blasco, J.4
Ribagorda, A.5
-
127
-
-
84900537680
-
An intrusiondetection model based on fuzzy class-association-rule mining using genetic network programming
-
Jan.
-
S. Mabu, C. Chen, N. Lu, K. Shimada, and K. Hirasawa, "An intrusiondetection model based on fuzzy class-association-rule mining using genetic network programming," IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 41, no. 1, pp. 130-139, Jan. 2011.
-
(2011)
IEEE Trans. Syst., Man, Cybern. C, Appl. Rev
, vol.41
, Issue.1
, pp. 130-139
-
-
Mabu, S.1
Chen, C.2
Lu, N.3
Shimada, K.4
Hirasawa, K.5
-
128
-
-
37249089471
-
Network anomaly detection based on DSOM and ACO clustering
-
Advances in Neural Networks - ISNN 2007 - 4th International Symposium on Neural Networks, ISNN 2007, Proceedings
-
Y. Feng, J. Zhong, Z.-y. Xiong, C.-x. Ye, and K.-g. Wu, "Network anomaly detection based on DSOM and ACO clustering," in Advances in Neural Networks-ISNN 2007, D. Liu, S. Fei, Z. Hou, H. Zhang, and C. Sun, Eds., (Lecture Notes in Computer Science vol. 4492) New York: Springer-Verlag, 2007, pp. 947-955. (Pubitemid 350270146)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4492
, Issue.PART 2
, pp. 947-955
-
-
Feng, Y.1
Zhong, J.2
Xiong, Z.-Y.3
Ye, C.-X.4
Wu, K.-G.5
-
129
-
-
33846318873
-
Ant colony clustering and feature extraction for anomaly intrusion detection
-
Swarm Intelligence in Data Mining, A. Abraham, C. Grosan, and V. Ramos, Eds New York: Springer-Verlag
-
C.-H. Tsang and S.Kwong, "Ant colony clustering and feature extraction for anomaly intrusion detection," in Swarm Intelligence in Data Mining, A. Abraham, C. Grosan, and V. Ramos, Eds., (Studies in Computational Intelligence vol. 34) New York: Springer-Verlag, 2006, pp. 101-123.
-
(2006)
Studies in Computational Intelligence
, vol.34
, pp. 101-123
-
-
Tsang, C.-H.1
Kwong, S.2
-
130
-
-
70449984497
-
Discovering classification rules for email spam filtering with an ant colony optimization algorithm
-
May
-
E.-S. M. El-Alfy, "Discovering classification rules for email spam filtering with an ant colony optimization algorithm," in Proc. IEEE Congr. Evol. Comput., May 2009, pp. 1778-1783.
-
(2009)
Proc. IEEE Congr. Evol. Comput.
, pp. 1778-1783
-
-
El-Alfy, E.-S.M.1
-
131
-
-
28444441282
-
Ant colony optimization based network intrusion feature selection and detection
-
2005 International Conference on Machine Learning and Cybernetics, ICMLC 2005
-
H.-H. Gao, H.-H.Yang, and X.-Y.Wang, "Ant colony optimization based network intrusion feature selection and detection," in Proc. Int. Mach. Learn. Cybern. Conf., Aug. 2005, vol. 6, pp. 3871-3875. (Pubitemid 41734590)
-
(2005)
2005 International Conference on Machine Learning and Cybernetics, ICMLC 2005
, pp. 3871-3875
-
-
Gao, H.-H.1
Yang, H.-H.2
Wang, X.-Y.3
-
133
-
-
34047197634
-
K-means algorithm based on particle swarm optimization algorithm for anomaly intrusion detection
-
L. Xiao, Z. Shao, and G. Liu, "K-means algorithm based on particle swarm optimization algorithm for anomaly intrusion detection," in Proc. 6th World Congr. Intell. Control Autom., 2006, vol. 2, pp. 5854-5858.
-
(2006)
Proc. 6th World Congr. Intell. Control Autom
, vol.2
, pp. 5854-5858
-
-
Xiao, L.1
Shao, Z.2
Liu, G.3
-
134
-
-
34548793095
-
Intrusion detection model based on particle swarm optimization and support vector machine
-
DOI 10.1109/CISDA.2007.368152, 4219099, Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2007
-
S. Srinoy, "Intrusion detection model based on particle swarm optimization and support vector machine," in Proc. IEEE Symp. Comput. Intell. Security Defense Appl., Apr. 2007, pp. 186-192. (Pubitemid 47431354)
-
(2007)
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2007
, pp. 186-192
-
-
Srinoy, S.1
-
135
-
-
39049125213
-
Particle swarm optimization-aided feature selection for spam email classification
-
Sep
-
C.-C. Lai and C.-H. Wu, "Particle swarm optimization-aided feature selection for spam email classification," in Proc. 2nd Int. Innovat. Comput., Inf. Control Conf., Sep. 2007, pp. 165-168.
-
(2007)
Proc. 2nd Int. Innovat. Comput., Inf. Control Conf
, pp. 165-168
-
-
Lai, C.-C.1
Wu, C.-H.2
-
137
-
-
0000270113
-
Learning using an artificial immune system
-
DOI 10.1006/jnca.1996.0014
-
J. E. Hunt and D. E. Cooke, "Learning using an artificial immune system," J. Netw. Comput. Appl., vol. 19, no. 2, pp. 189-212, 1996. (Pubitemid 126412791)
-
(1996)
Journal of Network and Computer Applications
, vol.19
, Issue.2
, pp. 189-212
-
-
Hunt, J.E.1
Cooke, D.E.2
-
138
-
-
33947317430
-
Artificial immune system inspired behavior-based anti-spam filter
-
DOI 10.1007/s00500-006-0116-0, Web intelligence and change discovery
-
X. Yue, A. Abraham, Z. Chi, Y. Hao, and H. Mo, "Artificial immune system inspired behavior-based anti-spam filter," Soft Comput.-Fusion Found., Methodol. Appl., vol. 11, no. 8, pp. 729-740, 2007. (Pubitemid 46437686)
-
(2007)
Soft Computing
, vol.11
, Issue.8
, pp. 729-740
-
-
Yue, X.1
Abraham, A.2
Chi, Z.-X.3
Hao, Y.-Y.4
Mo, H.5
-
139
-
-
44949095515
-
Artificial immune system for collaborative spam filtering
-
S. Sarafijanovic and J. Le Boudec, "Artificial immune system for collaborative spam filtering," Stud. Comput. Intell., vol. 129, pp. 39-51, 2008.
-
(2008)
Stud. Comput. Intell
, vol.129
, pp. 39-51
-
-
Sarafijanovic, S.1
Le Boudec, J.2
-
140
-
-
35449005874
-
Immune system approaches to intrusion detection - A review
-
DOI 10.1007/s11047-006-9026-4
-
J. Kim, P. Bentley, U. Aickelin, J. Greensmith, G. Tedesco, and J. Twycross, "Immune system approaches to intrusion detection-A review," Nat. Comput., vol. 6, no. 4, pp. 413-466, 2007. (Pubitemid 47629391)
-
(2007)
Natural Computing
, vol.6
, Issue.4
, pp. 413-466
-
-
Kim, J.1
Bentley, P.J.2
Aickelin, U.3
Greensmith, J.4
Tedesco, G.5
Twycross, J.6
-
141
-
-
69849102444
-
Multi-agent artificial immune systems (MAAIS) for intrusion detection: Abstraction from danger theory
-
Agent and Multi-Agent Systems.: Technologies and Applications New York: Springer-Verlag
-
C.-M. Ou and C. Ou, "Multi-agent artificial immune systems (MAAIS) for intrusion detection: Abstraction from danger theory," in Agent and Multi-Agent Systems.: Technologies and Applications, (Lecture Notes in Computer Science vol. 5559). New York: Springer-Verlag, 2009, pp. 11-19.
-
(2009)
Lecture Notes in Computer Science
, vol.5559
, pp. 11-19
-
-
Ou, C.-M.1
Ou, C.2
-
142
-
-
47849133272
-
Intrusion detection via artificial immune system: A performance-based approach
-
Biologically-Inspired Collaborative Computin New York: Springer
-
A. Visconti, N. Fusi, and H. Tahayori, "Intrusion detection via artificial immune system: A performance-based approach," in Biologically-Inspired Collaborative Computin (IFIP International Federation for Information Processing). New York: Springer, 2008, pp. 125-135.
-
(2008)
IFIP International Federation for Information Processing
, pp. 125-135
-
-
Visconti, A.1
Fusi, N.2
Tahayori, H.3
-
144
-
-
43049174001
-
Increasing the accuracy of a spam-detecting artificial immune system
-
T. Oda and T. White, "Increasing the accuracy of a spam-detecting artificial immune system," in Proc. Congr. Evol. Comput., 2003, pp. 390-396.
-
(2003)
Proc. Congr. Evol. Comput
, pp. 390-396
-
-
Oda, T.1
White, T.2
-
145
-
-
26944434277
-
Immunity from spam: An analysis of an artificial immune system for junk email detection
-
Artificial Immune Systems: 4th International Conference, ICARIS 2005. Proceedings
-
T. Oda and T. White, "Immunity from spam: An analysis of an artificial immune system," in Proc. 4th Int. Artif. Immune Syst. Conf., 2005, pp. 276-289. (Pubitemid 41472729)
-
(2005)
Lecture Notes in Computer Science
, vol.3627
, pp. 276-289
-
-
Oda, T.1
White, T.2
-
147
-
-
34548119887
-
An artificial immune system-inspired multiobjective evolutionary algorithm with application to the detection of distributed computer network intrusions
-
DOI 10.1145/1274000.1274035, Proceedings of GECCO 2007: Genetic and Evolutionary Computation Conference, Companion Material
-
C. R. Haag, G. B. Lamont, P. D. Williams, and G. L. Peterson, "An artificial immune system-inspired multiobjective evolutionary algorithm with application to the detection of distributed computer network intrusions," in Proc. 2007 GECCO Conf. Compan. Genet. Evol. Comput, 2007, pp. 2717-2724. (Pubitemid 47296783)
-
(2007)
Proceedings of GECCO 2007: Genetic and Evolutionary Computation Conference, Companion Material
, pp. 2717-2724
-
-
Haag, C.R.1
Lamont, G.B.2
Williams, P.D.3
Peterson, G.L.4
-
148
-
-
55849104353
-
A new model of self-adaptive network intrusion detection
-
Z. Qing-hua, Y.-z. Fu, and B.-g. Xu, "A new model of self-adaptive network intrusion detection," in Proc. IEEE Congr. Evol. Comput., 2008, pp. 436-439.
-
(2008)
Proc. IEEE Congr. Evol. Comput
, pp. 436-439
-
-
Qing-Hua, Z.1
Fu, Y.-Z.2
Xu, B.-G.3
-
149
-
-
48149109808
-
Using random forests for network-based anomaly detection at active routers
-
G. Prashanth, V. Prashanth, P. Jayashree, and N. Srinivasan, "Using random forests for network-based anomaly detection at active routers," in Proc. Conf. Signal Process., Commun. Network., 2008, pp. 93-96.
-
(2008)
Proc. Conf. Signal Process., Commun. Network
, pp. 93-96
-
-
Prashanth, G.1
Prashanth, V.2
Jayashree, P.3
Srinivasan, N.4
-
150
-
-
0011656690
-
Adaptation
-
J. H. Holland, "Adaptation," Progr. Theor. Biol., vol. 4, pp. 263-293, 1976.
-
(1976)
Progr. Theor. Biol
, vol.4
, pp. 263-293
-
-
Holland, J.H.1
-
152
-
-
57049102927
-
Learning classifier systems: Looking back and glimpsing ahead
-
J. Bacardit, B.-M. Ester, and M. V. Butz, "Learning classifier systems: Looking back and glimpsing ahead," in Proc. 10th Int. Workshop Learn. Classifier Syst., 2008, pp. 1-21.
-
(2008)
Proc. 10th Int. Workshop Learn. Classifier Syst
, pp. 1-21
-
-
Bacardit, J.1
Ester, B.-M.2
Butz, M.V.3
-
153
-
-
58349100775
-
Using self-organizing maps with learning classifier system for intrusion detection
-
PRICAI 2008: Trends in Artificial Intelligence NewYork: Springer-Verlag
-
K. Tamee, P. Rojanavasu, S. Udomthanapong, and O. Pinngern, "Using self-organizing maps with learning classifier system for intrusion detection," in PRICAI 2008: Trends in Artificial Intelligence, (Lecture Notes in Computer Science). NewYork: Springer-Verlag, 2008, pp. 1071-1076.
-
(2008)
Lecture Notes in Computer Science
, pp. 1071-1076
-
-
Tamee, K.1
Rojanavasu, P.2
Udomthanapong, S.3
Pinngern, O.4
-
154
-
-
84861637240
-
On XCSR for electronic fraud detection
-
M. Behdad, L. Barone, T. French, and M. Bennamoun, "On XCSR for electronic fraud detection," Evol. Intell., vol. 5, pp. 139-150, 2012.
-
(2012)
Evol. Intell
, vol.5
, pp. 139-150
-
-
Behdad, M.1
Barone, L.2
French, T.3
Bennamoun, M.4
-
155
-
-
35348935140
-
Handling imbalanced datasets: A review
-
S. Kotsiantis, D. Kanellopoulos, and P. Pintelas, "Handling imbalanced datasets: A review," GESTS Int. Trans. Comput. Sci. Eng., vol. 30, no. 1, pp. 25-36, 2006.
-
(2006)
GESTS Int. Trans. Comput. Sci. Eng
, vol.30
, Issue.1
, pp. 25-36
-
-
Kotsiantis, S.1
Kanellopoulos, D.2
Pintelas, P.3
-
156
-
-
71549117908
-
A particle swarm based hybrid system for imbalanced medical data sampling
-
P. Yang, L. Xu, B. Zhou, Z. Zhang, and A. Zomaya, "A particle swarm based hybrid system for imbalanced medical data sampling," BMC Genom., vol. 10, no. Suppl 3, 2009, pp. 1-14.
-
(2009)
BMC Genom
, vol.10
, Issue.SUPPL. 3
, pp. 1-14
-
-
Yang, P.1
Xu, L.2
Zhou, B.3
Zhang, Z.4
Zomaya, A.5
-
157
-
-
70349617264
-
Evolutionary undersampling for classification with imbalanced datasets: Proposals and taxonomy
-
Sep
-
S. Garća and F. Herrera, "Evolutionary undersampling for classification with imbalanced datasets: Proposals and taxonomy," Evol. Comput., vol. 17, no. 3, pp. 275-306, Sep. 2009.
-
(2009)
Evol. Comput
, vol.17
, Issue.3
, pp. 275-306
-
-
Garća, S.1
Herrera, F.2
-
158
-
-
27144549260
-
Editorial: Special issue on learning from imbalanced data sets
-
N. V. Chawla, N. Japkowicz, and A. Kotcz, "Editorial: Special issue on learning from imbalanced data sets," ACMSIGKDD Explorat. Newslett., vol. 6, no. 1, pp. 1-6, 2004.
-
(2004)
ACMSIGKDD Explorat. Newslett
, vol.6
, Issue.1
, pp. 1-6
-
-
Chawla, N.V.1
Japkowicz, N.2
Kotcz, A.3
-
159
-
-
35348821822
-
Intrusion detection in computer networks by a modular ensemble of one-class classifiers
-
DOI 10.1016/j.inffus.2006.10.002, PII S1566253506000765, Applications of Ensemble Methods
-
G. Giacinto, R. Perdisci, M. D. Rio, and F. Roli, "Intrusion detection in computer networks by a modular ensemble of one-class classifiers," Inf. Fus., vol. 9, no. 1, pp. 69-82, 2008. (Pubitemid 47589059)
-
(2008)
Information Fusion
, vol.9
, Issue.1
, pp. 69-82
-
-
Giacinto, G.1
Perdisci, R.2
Del Rio, M.3
Roli, F.4
-
160
-
-
0034825091
-
Supervised versus unsupervised binary-learning by feedforward neural networks
-
DOI 10.1023/A:1007660820062
-
N. Japkowicz, "Supervised versus unsupervised binary-learning by feedforward neural networks," Mach. Learn., vol. 42, pp. 97-122, 2001. (Pubitemid 32872400)
-
(2001)
Machine Learning
, vol.42
, Issue.1-2
, pp. 97-122
-
-
Japkowicz, N.1
-
161
-
-
84859001991
-
Developing new fitness functions in genetic programming for classification with unbalanced data
-
Apr.
-
U. Bhowan, M. Johnston, and M. Zhang, "Developing new fitness functions in genetic programming for classification with unbalanced data," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 42, no. 2, pp. 406-421, Apr. 2012.
-
(2012)
IEEE Trans. Syst., Man, Cybern. B, Cybern
, vol.42
, Issue.2
, pp. 406-421
-
-
Bhowan, U.1
Johnston, M.2
Zhang, M.3
-
162
-
-
27144524459
-
Class imbalance problem in UCS classifier system: Fitness adaptation
-
2005 IEEE Congress on Evolutionary Computation, IEEE CEC 2005. Proceedings
-
A. Orriols and E. Bernado-Mansilla, "Class imbalance problem in UCS classifier system: Fitness adaptation," in Proc. IEEE Congr. Evol. Comput., 2005, vol. 1, pp. 604-611. (Pubitemid 41495907)
-
(2005)
2005 IEEE Congress on Evolutionary Computation, IEEE CEC 2005. Proceedings
, vol.1
, pp. 604-611
-
-
Orriols, A.1
Bernadl-Mansilla, E.2
-
163
-
-
55549116330
-
Evolutionary rule-based systems for imbalanced data sets
-
A. Orriols-Puig and E. Bernad́o-Mansilla, "Evolutionary rule-based systems for imbalanced data sets," Soft Comput.-A Fus. Found.,Methodol. Appl., vol. 13, no. 3, pp. 213-225, 2009.
-
(2009)
Soft Comput.-A Fus. Found.,Methodol. Appl
, vol.13
, Issue.3
, pp. 213-225
-
-
Orriols-Puig, A.1
Bernad́o-Mansilla, E.2
-
164
-
-
12244295760
-
Adversarial classification
-
KDD-2004 - Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
N. Dalvi, P. Domingos,Mausam, S. Sanghai, andD.Verma, "Adversarial classification," in Proc. 10th ACM SIGKDD Int. Conf. Knowl. Discov. Data Mining, 2004, pp. 99-108. (Pubitemid 40114920)
-
(2004)
KDD-2004 - Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Mausam3
Sanghai, S.4
Verma, D.5
-
165
-
-
15944395410
-
A game theoretic approach to modeling intrusion detection in mobile ad hoc networks
-
464, Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC
-
A. Patcha and J.-M. Park, "A game theoretic approach to modeling intrusion detection in mobile ad hoc networks," in Proc. Inf. Assur. Workshop, 2004. Proc. 5th Annu. IEEE SMC, Jun. 2004, pp. 280-284. (Pubitemid 40442803)
-
(2004)
Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC
, pp. 280-284
-
-
Patcha, A.1
Park, J.-M.2
-
167
-
-
33646420793
-
Usingmultiple windows to track concept drift
-
M. M. Lazarescu, S.Venkatesh, and H. H. Bui, "Usingmultiple windows to track concept drift," Intell. Data Anal., vol. 8, no. 1, pp. 29-59, 2004.
-
(2004)
Intell. Data Anal
, vol.8
, Issue.1
, pp. 29-59
-
-
Lazarescu, M.M.1
Venkatesh, S.2
Bui, H.H.3
-
168
-
-
37749050180
-
Dynamic weighted majority: An ensemble method for drifting concepts
-
J. Z. Kolter and M. A. Maloof, "Dynamic weighted majority: An ensemble method for drifting concepts," J. Mach. Learn. Res., vol. 8, pp. 2755-2790, 2007.
-
(2007)
J. Mach. Learn. Res
, vol.8
, pp. 2755-2790
-
-
Kolter, J.Z.1
Maloof, M.A.2
-
170
-
-
3543113272
-
On the impact of systematic noise on the evolutionary optimization performance-A sphere model analysis
-
H. Beyer, M. Olhofer, and B. Sendhoff, "On the impact of systematic noise on the evolutionary optimization performance-A sphere model analysis," Genet. Programm. Evol. Mach., vol. 5, no. 4, pp. 327-360, 2004.
-
(2004)
Genet. Programm. Evol. Mach
, vol.5
, Issue.4
, pp. 327-360
-
-
Beyer, H.1
Olhofer, M.2
Sendhoff, B.3
-
171
-
-
0034143132
-
Noise detection and elimination in data preprocessing: Experiments in medical domains
-
DOI 10.1080/088395100117124
-
D. Gamberger, N. Lavrac, and S. Dzeroski, "Noise detection and elimination in data preprocessing: Experiments in medical domains," Appl. Artif. Intell., vol. 14, no. 2, pp. 205-223, 2000. (Pubitemid 35394295)
-
(2000)
Applied Artificial Intelligence
, vol.14
, Issue.2
, pp. 205-223
-
-
Gamberger, D.1
Lavrac, N.2
Dzeroski, S.3
-
172
-
-
4344586460
-
Applying evolutionary algorithms to problems with noisy, time-consuming fitness functions
-
A. Di Pietro, L. While, and L. Barone, "Applying evolutionary algorithms to problems with noisy, time-consuming fitness functions," in Proc. Congr. Evol. Comput., 2004, vol. 2, pp. 1254-1261.
-
(2004)
Proc. Congr. Evol. Comput
, vol.2
, pp. 1254-1261
-
-
Di Pietro, A.1
While, L.2
Barone, L.3
-
173
-
-
56449086193
-
A steady-state genetic algorithm with resampling for noisy inventory control
-
S. Prestwich, S. Tarim, R. Rossi, and B. Hnich, "A steady-state genetic algorithm with resampling for noisy inventory control," in Proc. 10th Int. Conf. Parallel Probl. Solv. Nature, 2008, pp. 559-568.
-
(2008)
Proc. 10th Int. Conf. Parallel Probl. Solv. Nature
, pp. 559-568
-
-
Prestwich, S.1
Tarim, S.2
Rossi, R.3
Hnich, B.4
-
174
-
-
77954694911
-
Filtering spams using the minimum description length principle
-
T. A. Almeida, A. Yamakami, and J. Almeida, "Filtering spams using the minimum description length principle," in Proc. 2010 ACM Symp. Appl. Comput., 2010, pp. 1854-1858.
-
(2010)
Proc. 2010 ACM Symp. Appl. Comput
, pp. 1854-1858
-
-
Almeida, T.A.1
Yamakami, A.2
Almeida, J.3
-
175
-
-
34547673383
-
Cost-sensitive boosting for classification of imbalanced data
-
DOI 10.1016/j.patcog.2007.04.009, PII S0031320307001835
-
Y. Sun, M. S. Kamel, A. K.Wong, andY.Wang, "Cost-sensitive boosting for classification of imbalanced data," Pattern Recognit., vol. 40, no. 12, pp. 3358-3378, 2007. (Pubitemid 47223287)
-
(2007)
Pattern Recognition
, vol.40
, Issue.12
, pp. 3358-3378
-
-
Sun, Y.1
Kamel, M.S.2
Wong, A.K.C.3
Wang, Y.4
-
176
-
-
40749149223
-
A fast numerical algorithm for the estimation of diffusion model parameters
-
A. Voss and J. Voss, "A fast numerical algorithm for the estimation of diffusion model parameters," J. Math. Psychol., vol. 52, no. 1, pp. 1-9, 2008.
-
(2008)
J. Math. Psychol
, vol.52
, Issue.1
, pp. 1-9
-
-
Voss, A.1
Voss, J.2
-
177
-
-
45849134070
-
Sparse inverse covariance estimation with the graphical lasso
-
DOI 10.1093/biostatistics/kxm045
-
J. Friedman, T. Hastie, and R. Tibshirani, "Sparse inverse covariance estimation with the graphical lasso," Biostatistics, vol. 9, no. 3, pp. 432-441, 2008. (Pubitemid 351882084)
-
(2008)
Biostatistics
, vol.9
, Issue.3
, pp. 432-441
-
-
Friedman, J.1
Hastie, T.2
Tibshirani, R.3
-
178
-
-
77955887603
-
Speeding up the evaluation of evolutionary learning systems using GPGPUs
-
M. A. Franco,N.Krasnogor, and J. Bacardit, "Speeding up the evaluation of evolutionary learning systems using GPGPUs," in Proc. 12th Annu. Genet. Evol. Comput. Conf., 2010, pp. 1039-1046.
-
(2010)
Proc. 12th Annu. Genet. Evol. Comput. Conf
, pp. 1039-1046
-
-
Franco, M.A.1
Krasnogor, N.2
Bacardit, J.3
-
179
-
-
0019533482
-
Principal component analysis in linear systems - Controllability, observability, and model reduction
-
B. Moore, "Principal component analysis in linear systems: Controllability, observability, and model reduction," IEEE Trans. Automat. Control, vol. AC-26, no. 1, pp. 17-32, Feb. 1981. (Pubitemid 11495780)
-
(1981)
IEEE Transactions on Automatic Control
, vol.AC-26
, Issue.1
, pp. 17-32
-
-
Moore Bruce, C.1
-
180
-
-
84861595365
-
On principal component analysis for high-dimensional XCSR
-
M. Behdad, T. French, L. Barone, and M. Bennamoun, "On principal component analysis for high-dimensional XCSR," Evol. Intell., vol. 5, pp. 129-138, 2012.
-
(2012)
Evol. Intell
, vol.5
, pp. 129-138
-
-
Behdad, M.1
French, T.2
Barone, L.3
Bennamoun, M.4
-
181
-
-
57349172034
-
Fast rule representation for continuous attributes in genetics-based machine learning
-
J. Bacardit and N. Krasnogor, "Fast rule representation for continuous attributes in genetics-based machine learning," in Proc. 10th Annu. Genet. Evol. Comput. Conf., 2008, pp. 1421-1422.
-
(2008)
Proc. 10th Annu. Genet. Evol. Comput. Conf
, pp. 1421-1422
-
-
Bacardit, J.1
Krasnogor, N.2
-
182
-
-
43749119566
-
Reducing internet auction fraud
-
DOI 10.1145/1342327.1342343
-
B. Gavish and C. L. Tucci, "Reducing internet auction fraud," Commun. ACM, vol. 51, no. 5, pp. 89-97, 2008. (Pubitemid 351690942)
-
(2008)
Communications of the ACM
, vol.51
, Issue.5
, pp. 89-97
-
-
Gavish, B.1
Tucci, C.L.2
-
183
-
-
67449162055
-
Click fraud
-
K. C. Wilbur and Y. Zhu, "Click fraud," Market. Sci., vol. 28, no. 2, pp. 293-308, 2009.
-
(2009)
Market. Sci
, vol.28
, Issue.2
, pp. 293-308
-
-
Wilbur, K.C.1
Zhu, Y.2
-
186
-
-
33750682639
-
Detecting spam blogs: A machine learning approach
-
Proceedings of the 21st National Conference on Artificial Intelligence and the 18th Innovative Applications of Artificial Intelligence Conference, AAAI-06/IAAI-06
-
P. Kolari, A. Java, T. Finin, T. Oates, and A. Joshi, "Detecting spam blogs: A machine learning approach," in Proc. 21st Nat. Conf. Artif. Intell., 2006, pp. 1351-1356. (Pubitemid 44705462)
-
(2006)
Proceedings of the National Conference on Artificial Intelligence
, vol.2
, pp. 1351-1356
-
-
Kolari, P.1
Java, A.2
Finin, T.3
Oates, T.4
Joshi, A.5
-
188
-
-
34548334405
-
Review spam detection
-
DOI 10.1145/1242572.1242759, 16th International World Wide Web Conference, WWW2007
-
N. Jindal and B. Liu, "Review spam detection," in Proc. 16th Int. Conf. World Wide Web., 2007, pp. 1189-1190. (Pubitemid 47582376)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 1189-1190
-
-
Jindal, N.1
Liu, B.2
-
189
-
-
41849084474
-
Automatic vandalism detection in Wikipedia
-
DOI 10.1007/978-3-540-78646-7-75, Advances in Information Retrieval - 30th European Conference on IR Research, ECIR 2008, Proceedings
-
M. Potthast, B. Stein, and R. Gerling, "Automatic vandalism detection in wikipedia," in Advances in Information Retrieval, C. Macdonald, I. Ounis, V. Plachouras, I. Ruthven, and R. White, Eds., (Lecture Notes in Computer Science vol. 4956) Berlin/Heidelberg, Germany: Springer-Verlag, 2008, pp. 663-668. (Pubitemid 351499122)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4956
, pp. 663-668
-
-
Potthast, M.1
Stein, B.2
Gerling, R.3
-
190
-
-
62949111148
-
Computer-based plagiarism detection methods and tools: An overview
-
New York: ACM
-
R. Lukashenko, V. Graudina, and J. Grundspenkis, "Computer-based plagiarism detection methods and tools: An overview," in Proc. 2007 Int. Comput. Syst. Technol. Conf. New York: ACM, 2007, pp. 1-6.
-
(2007)
Proc. 2007 Int. Comput. Syst. Technol. Conf.
, pp. 1-6
-
-
Lukashenko, R.1
Graudina, V.2
Grundspenkis, J.3
-
191
-
-
33747174227
-
SVMs for the Blogosphere: Blog identification and splog detection
-
Computational Approaches to Analyzing Weblogs - Papers from the AAAI Spring Symposium, Technical Report
-
P. Kolari, T. Finin, and A. Joshi, "SVMs for the blogosphere: Blog identification and splog detection," in Proc. AAAI Spring Symp. Comput. Approaches Anal. Weblogs, 2006, pp. 92-99. (Pubitemid 44230534)
-
(2006)
AAAI Spring Symposium - Technical Report
, vol.SS-06-03
, pp. 92-99
-
-
Kolari, P.1
Finin, T.2
Joshi, A.3
|