-
1
-
-
84876048916
-
Anomaly based intrusion detection using hybrid learning approach of combining k-medoids clustering and naïve bayes classification
-
Shanghai, China
-
Roshan Chitrakar and Huang Chuanhe, "Anomaly based Intrusion Detection using Hybrid Learning Approach of combining k-Medoids Clustering and Naïve Bayes Classification", The 8th International Conference on Wireless Communication, Networking and Moblie Computing, Shanghai, China, 2012.
-
(2012)
The 8th International Conference on Wireless Communication, Networking and Moblie Computing
-
-
Chitrakar, R.1
Chuanhe, H.2
-
2
-
-
73849107847
-
Network intrusion detection based on support vector machine
-
Xiaohui Bao, Tianqi Xu, Hui Hou, "Network Intrusion Detection Based on Support Vector Machine", Proceedings - International Conference on Management and Service Science, MASS 2009, 2009.
-
(2009)
Proceedings - International Conference on Management and Service Science, MASS 2009
-
-
Bao, X.1
Xu, T.2
Hou, H.3
-
3
-
-
78651541204
-
Applying knowledge discovery in database techniques in modeling packet header anomaly intrusion detection systems
-
Solahuddin
-
Solahuddin, "Applying Knowledge Discovery in Database Techniques in Modeling Packet Header Anomaly Intrusion Detection Systems", Journal of Software, 3 (9): 68-76, 2008.
-
(2008)
Journal of Software
, vol.3
, Issue.9
, pp. 68-76
-
-
-
5
-
-
34247636165
-
Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection
-
DOI 10.1016/j.patcog.2006.12.009, PII S0031320306005218
-
C.H. Tsang, S. Kwong, and H. Wang, "Genetic-Fuzzy Rule Mining Approach and Evaluation of Feature Selection Techniques for Anomaly Intrusion Detection," Pattern Recognition, 40:2373-2391, 2007 (Pubitemid 46669583)
-
(2007)
Pattern Recognition
, vol.40
, Issue.9
, pp. 2373-2391
-
-
Tsang, C.-H.1
Kwong, S.2
Wang, H.3
-
6
-
-
68949161842
-
A triangle area-based nearest neighbors approach to intrusion detection
-
C. F. Tsai, and C.Y Lin, "A Triangle Area-Based Nearest Neighbors Approach to Intrusion Detection," Pattern Recognition, 43(1), 2010.
-
(2010)
Pattern Recognition
, vol.43
, Issue.1
-
-
Tsai, C.F.1
Lin, C.Y.2
-
7
-
-
36549085110
-
An active learning based TCM-KNN algorithm for supervised network intrusion detection
-
DOI 10.1016/j.cose.2007.10.002, PII S0167404807001101
-
Y. Li and L. Guo, "An Active Learning Based on TCM-KNN Algorithm for Supervised Network Intrusion", Computer and Securtiy, 26: 459- 467, 2007 (Pubitemid 350191973)
-
(2007)
Computers and Security
, vol.26
, Issue.7-8
, pp. 459-467
-
-
Li, Y.1
Guo, L.2
-
8
-
-
84873543004
-
Traffic classification using clustering algorithms
-
Pisa, Italy, ACM Press, Sep. 11-15
-
R. Luigi, T.E. Anderson, and N. McKeown, "Traffic Classification using Clustering Algorithms". ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy, ACM Press, Sep. 11-15, 2011.
-
(2011)
ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
-
-
Luigi, R.1
Anderson, T.E.2
McKeown, N.3
-
9
-
-
2442424268
-
Naïve bayes vs decision trees in intrusion detection systems
-
B.A. Nahla, B. Salem, and E. Zied, "Naïve Bayes vs Decision Trees in Intrusion Detection Systems", ACM Symposium on Applied Computing, Nicosia, Cyprus, 2004.
-
(2004)
ACM Symposium on Applied Computing, Nicosia, Cyprus
-
-
Nahla, B.A.1
Salem, B.2
Zied, E.3
-
10
-
-
84856688089
-
Intrusion detection based on k-means clustering and naïve bayes classification
-
Z. Muda, W. Yassin, M.N. Sulaiman, N.I. Udzir , "Intrusion Detection based on k-Means Clustering and Naïve Bayes Classification" , 7th International Conference on IT in Asia (CITA) , 2011.
-
(2011)
7th International Conference on IT in Asia (CITA)
-
-
Muda, Z.1
Yassin, W.2
Sulaiman, M.N.3
Udzir, N.I.4
-
11
-
-
81855197007
-
An efficient intrusion detection system based on support vector machines and gradually feature removal method
-
January
-
Yinhui Li, Jingbo Xia, Silan Zhang, Jiakai Yan, Xiaochuan Ai, Kuobin Dai, "An efficient intrusion detection system based on support vector machines and gradually feature removal method", Expert Systems with Applications, v 39, n 1, p 424-430, January 2012.
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.1
, pp. 424-430
-
-
Li, Y.1
Xia, J.2
Zhang, S.3
Yan, J.4
Ai, X.5
Dai, K.6
-
12
-
-
84863012506
-
An intrusion detection approach using SVM and multiple kernel method
-
January
-
Yuping Li , Weidong Li, Guoqiang Wu, "An Intrusion Detection Approach Using SVM and Multiple Kernel Method", International Journal of Advancements in Computing Technology, v 4, n 1, p 463-469, January 2012.
-
(2012)
International Journal of Advancements in Computing Technology
, vol.4
, Issue.1
, pp. 463-469
-
-
Li, Y.1
Li, W.2
Wu, G.3
-
13
-
-
77952524606
-
Computational complexity between k-means and k-medoids clustering algorithms for normal and uniform distributions of data points
-
T. Velmurugan and T. Santhanam, "Computational Complexity between k-Means and k-Medoids Clustering Algorithms for Normal and Uniform Distributions of Data Points", Journal of Computer Science, 6 (3): 363- 368, 2010.
-
(2010)
Journal of Computer Science
, vol.6
, Issue.3
, pp. 363-368
-
-
Velmurugan, T.1
Santhanam, T.2
-
14
-
-
11244249796
-
Design of multiple-level tree classifiers for intrusion detection system
-
Singapore
-
Xiang, C., M.Y. Chong and H.L.Zhu, "Design of Multiple-Level Tree Classifiers for Intrusion Detection System". IEEE Conference on Cybernetics and Intellligent Systems, Singapore, pp: 873-878, 2004.
-
(2004)
IEEE Conference on Cybernetics and Intellligent Systems
, pp. 873-878
-
-
Xiang, C.1
Chong, M.Y.2
Zhu, H.L.3
-
15
-
-
33750514606
-
Modeling intrusion detection system using hybrid intelligent systems
-
DOI 10.1016/j.jnca.2005.06.003, PII S1084804505000445, Network and Information Security: A Computational Intelligence Approach
-
Peddabachigiri, S., A. Abraham, C. Grosan and J. Thomas, "Modeling Intrusion Detection System using Hybrid Intelligent Systems", J. Network Comput. Appl., 30: 114-132, 2007. (Pubitemid 44666486)
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 114-132
-
-
Peddabachigari, S.1
Abraham, A.2
Grosan, C.3
Thomas, J.4
-
16
-
-
33845519499
-
Comparison of SVM and some older classification algorithms in text classification tasks
-
DOI 10.1007/978-0-387-34747-9-18, Artificial Intelligence in Theory and Practice: IFIP 19th World Computer Congress, TC 12: IFIP AI 2006 Stream, August 21-24, 2006, Santiago, Chile
-
Fabrice Colas and Pavel Brazdil, "Comparison of SVM and Some Older Classification Algorithms in Text Classification Tasks", Proceedings - IFIP AI Proceeding, pp.169-178, 2006. (Pubitemid 44920580)
-
(2006)
IFIP International Federation for Information Processing
, vol.217
, pp. 169-178
-
-
Colas, F.1
Brazdil, P.2
-
17
-
-
44649092482
-
Comparing naive bayes, decision trees, and SVM with AUC and accuracy
-
Jin Huang, Jingjing Lu, Charles X. Ling, "Comparing Naive Bayes, Decision Trees, and SVM with AUC and Accuracy", The Third International Conference on Data Mining, 2003.
-
(2003)
The Third International Conference on Data Mining
-
-
Huang, J.1
Lu, J.2
Ling, C.X.3
-
19
-
-
84873528396
-
-
Trafic Data from Kyoto University's Honeypots
-
Trafic Data from Kyoto University's Honeypots. http://www.takakura.com/ Kyotodata/
-
-
-
-
21
-
-
80054915787
-
An autonomous labelling approach to support vector machine algorithms for network traffic anomaly detection
-
February
-
Carlos A. Catania, Facundo Bromberg, Carlos Garcia Garino, "An Autonomous Labelling Approach to Support Vector Machine Algorithms for Network Traffic Anomaly Detection", Expert Systems with Applications: An International Journal Archive, vol. 39 Issue 2, February 2012.
-
(2012)
Expert Systems with Applications: An International Journal Archive
, vol.39
, Issue.2
-
-
Catania, C.A.1
Bromberg, F.2
Garcia Garino, C.3
|