-
2
-
-
84872137204
-
Application of Fuzzy Association Rules-Based Feature Selection and Fuzzy ARTMAP to Intrusion Detection
-
M. Sheikhan, et al., "Application of Fuzzy Association Rules-Based Feature Selection and Fuzzy ARTMAP to Intrusion Detection," Majlesi Journal of Electrical Engineering, vol. 5, 2011.
-
(2011)
Majlesi Journal of Electrical Engineering
, vol.5
-
-
Sheikhan, M.1
-
3
-
-
61849175333
-
Efficient deterministic method for detecting new U2R attacks
-
R. Beghdad, "Efficient deterministic method for detecting new U2R attacks," Computer Communications, vol. 32, pp. 1104-1110, 2009.
-
(2009)
Computer Communications
, vol.32
, pp. 1104-1110
-
-
Beghdad, R.1
-
7
-
-
69249230890
-
Intrusion detection by machine learning: A review
-
C. F. Tsai, et al., "Intrusion detection by machine learning: A review," Expert Systems with Applications, vol. 36, pp. 11994-12000, 2009.
-
(2009)
Expert Systems with Applications
, vol.36
, pp. 11994-12000
-
-
Tsai, C.F.1
-
9
-
-
79151484606
-
Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset
-
V. Bolón-Canedo, et al., "Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset," Expert Systems with Applications, vol. 38, pp. 5947-5957, 2011.
-
(2011)
Expert Systems with Applications
, vol.38
, pp. 5947-5957
-
-
Bolón-Canedo, V.1
-
11
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
S. Chebrolu, et al., "Feature deduction and ensemble design of intrusion detection systems," Computers & Security, vol. 24, pp. 295-307, 2005.
-
(2005)
Computers & Security
, vol.24
, pp. 295-307
-
-
Chebrolu, S.1
-
12
-
-
84855369803
-
Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification
-
H. F. Eid, et al., "Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification," Security Technology, pp. 195-203, 2011.
-
(2011)
Security Technology
, pp. 195-203
-
-
Eid, H.F.1
-
15
-
-
84872167049
-
Effects of feature reduction on the performance of attack recognition by static and dynamic neural networks
-
M. Sheikhan, et al., "Effects of feature reduction on the performance of attack recognition by static and dynamic neural networks," World Applied Sciences Journal, vol. 8, pp. 302-308, 2010.
-
(2010)
World Applied Sciences Journal
, vol.8
, pp. 302-308
-
-
Sheikhan, M.1
-
17
-
-
76749092270
-
The WEKA data mining software: An update
-
M. Hall, et al., "The WEKA data mining software: an update," ACM SIGKDD Explorations Newsletter, vol. 11, pp. 10-18, 2009.
-
(2009)
ACM SIGKDD Explorations Newsletter
, vol.11
, pp. 10-18
-
-
Hall, M.1
-
18
-
-
0001880210
-
KDD-Cup 2000 organizers' report: Peeling the onion
-
R. Kohavi, et al., "KDD-Cup 2000 organizers' report: peeling the onion," ACM SIGKDD Explorations Newsletter, vol. 2, pp. 86-93, 2000.
-
(2000)
ACM SIGKDD Explorations Newsletter
, vol.2
, pp. 86-93
-
-
Kohavi, R.1
-
19
-
-
1642354876
-
KDD-99 Classifier Learning Contest: LLSoft's Results Overview
-
I. Levin, "KDD-99 Classifier Learning Contest: LLSoft's Results Overview," SIGKDD explorations, vol. 1, pp. 67-75, 2000.
-
(2000)
SIGKDD Explorations
, vol.1
, pp. 67-75
-
-
Levin, I.1
-
20
-
-
34447639073
-
A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers
-
A. N. Toosi and M. Kahani, "A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers," Computer Communications, vol. 30, pp. 2201-2212, 2007.
-
(2007)
Computer Communications
, vol.30
, pp. 2201-2212
-
-
Toosi, A.N.1
Kahani, M.2
-
21
-
-
0001880210
-
KDD-Cup 2000 organizers' report: Peeling the onion
-
Kohavi, R., Brodley, C. E., Frasca, B., Mason, L., & Zheng, Z. (2000). KDD-Cup 2000 organizers' report: peeling the onion. ACM SIGKDD Explorations Newsletter, 2(2), 86-93.
-
(2000)
ACM SIGKDD Explorations Newsletter
, vol.2
, Issue.2
, pp. 86-93
-
-
Kohavi, R.1
Brodley, C.E.2
Frasca, B.3
Mason, L.4
Zheng, Z.5
-
22
-
-
78649888272
-
-
Alazab, M, Venkataraman, S & Watters, P 2010, 'Towards Understanding Malware Behaviour by the Extraction of API Calls', in pp. 52-9.
-
(2010)
Towards Understanding Malware Behaviour by the Extraction of API Calls
, pp. 52-59
-
-
Alazab, M.1
Venkataraman, S.2
Watters, P.3
-
23
-
-
84877304569
-
-
Alazab, M, Venkatraman, S & Watters, P 2011, 'Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures', in pp. 171-81..
-
(2011)
Zero-day Malware Detection Based on Supervised Learning Algorithms of API Call Signatures
, pp. 171-181
-
-
Alazab, M.1
Venkatraman, S.2
Watters, P.3
|