-
2
-
-
0036613083
-
An immunity-based technique to characterize intrusions in computer networks
-
Dasgupta D., Gonzalez F. An immunity-based technique to characterize intrusions in computer networks. IEEE Trans. Evol. Comput. 2002, 6:1081-1088.
-
(2002)
IEEE Trans. Evol. Comput.
, vol.6
, pp. 1081-1088
-
-
Dasgupta, D.1
Gonzalez, F.2
-
3
-
-
78149297786
-
Learning rules for anomaly detection of hostile network traffic
-
Melbourne, FL, IEEE Computer Society
-
M. Mahoney, P. Chan, Learning rules for anomaly detection of hostile network traffic, in: Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM-2003), Melbourne, FL, IEEE Computer Society, 2003, pp. 601-604.
-
(2003)
Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM-2003)
, pp. 601-604
-
-
Mahoney, M.1
Chan, P.2
-
4
-
-
33847704184
-
KMeans+ID3. a novel method for supervised anomaly detection by cascading K-means clustering and ID3 decision tree learning methods
-
March
-
Gaddam Shekhar R., Phoha Vir V., Balagani Kiran S. KMeans+ID3. a novel method for supervised anomaly detection by cascading K-means clustering and ID3 decision tree learning methods. IEEE Trans. Knowl. Data Eng. 2007, 19(March (3)):345-354.
-
(2007)
IEEE Trans. Knowl. Data Eng.
, vol.19
, Issue.3
, pp. 345-354
-
-
Gaddam, S.R.1
Phoha, V.V.2
Balagani, K.S.3
-
5
-
-
34548858181
-
An intrusion detection system based on the clustering ensemble
-
W. Fangfei, J. Qingshan, S. Liang, W. Nannan, An intrusion detection system based on the clustering ensemble, in: IEEE International Workshop on 16-18 April 2007, p. 12.
-
(2007)
IEEE International Workshop on 16-18 April
, pp. 12
-
-
Fangfei, W.1
Qingshan, J.2
Liang, S.3
Nannan, W.4
-
6
-
-
52949101047
-
Agglomerative fuzzy K-means clustering algorithm with selection of number of clusters
-
November
-
Mark L.J., Michael K., Yiu-ming C., Huang J.Z. Agglomerative fuzzy K-means clustering algorithm with selection of number of clusters. IEEE Trans. Knowl. Data Eng. 2008, 20(November (11)):1519-1534.
-
(2008)
IEEE Trans. Knowl. Data Eng.
, vol.20
, Issue.11
, pp. 1519-1534
-
-
Mark, L.J.1
Michael, K.2
Yiu-ming, C.3
Huang, J.Z.4
-
8
-
-
70350528581
-
The application on intrusion detection based on K-means cluster algorithm
-
IEEE, 15-17 May
-
M. Jianliang, S. Haikun, B. Ling, The application on intrusion detection based on K-means cluster algorithm, in: International Forum on Information Technology and Application, IEEE, 15-17 May 2009, pp. 150-152.
-
(2009)
International Forum on Information Technology and Application
, pp. 150-152
-
-
Jianliang, M.1
Haikun, S.2
Ling, B.3
-
9
-
-
37749036828
-
Adaptive intrusion detection based on machine learning. feature extraction, classifier construction and sequential pattern prediction
-
Xu X. Adaptive intrusion detection based on machine learning. feature extraction, classifier construction and sequential pattern prediction. Int. J. Web Serv. Pract. 2006, 2(1-2):49-58.
-
(2006)
Int. J. Web Serv. Pract.
, vol.2
, Issue.1-2
, pp. 49-58
-
-
Xu, X.1
-
10
-
-
33749255382
-
PAC model-free reinforcement learning
-
A.L. Strehl, L. Li, E. Wiewiora, J. Langford, M.L. Littman, PAC model-free reinforcement learning, in: ICML '06 Proceedings of the 23rd International Conference on Machine Learning.
-
ICML '06 Proceedings of the 23rd International Conference on Machine Learning
-
-
Strehl, A.L.1
Li, L.2
Wiewiora, E.3
Langford, J.4
Littman, M.L.5
-
11
-
-
57749177069
-
Potential-based shaping in model-based reinforcement learning
-
AAAI Press
-
J. Asmuth, M.L. Littman, R. Zinkov, Potential-based shaping in model-based reinforcement learning, in: Proceedings of the 23rd AAAI Conference on Artificial Intelligence, AAAI Press, 2008, pp. 604-609.
-
(2008)
Proceedings of the 23rd AAAI Conference on Artificial Intelligence
, pp. 604-609
-
-
Asmuth, J.1
Littman, M.L.2
Zinkov, R.3
-
12
-
-
78649507911
-
A Bayesian sampling approach to exploration in reinforcement learning
-
J. Asmuth, L. Li, M.L. Littman, A. Nouri, D. Wingate, A Bayesian sampling approach to exploration in reinforcement learning, in: Proceedings of the 25th Conference on Uncertainty in Artificial Intelligence, 2009.
-
(2009)
Proceedings of the 25th Conference on Uncertainty in Artificial Intelligence
-
-
Asmuth, J.1
Li, L.2
Littman, M.L.3
Nouri, A.4
Wingate, D.5
-
14
-
-
70049084399
-
CORL: a continuous-state offset-dynamics reinforcement learner
-
E. Brunskill, B.R. Leffler, L. Li, M.L. Littman, N. Roy, CORL: a continuous-state offset-dynamics reinforcement learner, in: Proceedings of the 24th Conference on Uncertainty in Artificial Intelligence, 2008, pp. 53-61.
-
(2008)
Proceedings of the 24th Conference on Uncertainty in Artificial Intelligence
, pp. 53-61
-
-
Brunskill, E.1
Leffler, B.R.2
Li, L.3
Littman, M.L.4
Roy, N.5
-
16
-
-
23244466805
-
-
Ph.D. Thesis, Gatsby Computational Neuroscience Unit, University College London
-
S.M. Kakade, On the sample complexity of reinforcement learning, Ph.D. Thesis, Gatsby Computational Neuroscience Unit, University College London, 2003.
-
(2003)
On the sample complexity of reinforcement learning
-
-
Kakade, S.M.1
-
17
-
-
36349026477
-
Efficient reinforcement learning with relocatable action models
-
B.R. Leffler, M.L. Littman, T. Edmunds, Efficient reinforcement learning with relocatable action models, in: Proceedings of the 22nd Conference on Artificial Intelligence, 2007, pp. 572-577.
-
(2007)
Proceedings of the 22nd Conference on Artificial Intelligence
, pp. 572-577
-
-
Leffler, B.R.1
Littman, M.L.2
Edmunds, T.3
-
18
-
-
84862014735
-
An analysis of Q-learning algorithms with strategies of reward function
-
Manju S., Punithavalli M. An analysis of Q-learning algorithms with strategies of reward function. Int. J. Comput. Sci. Eng. (IJCSE) 2011, 3(2).
-
(2011)
Int. J. Comput. Sci. Eng. (IJCSE)
, vol.3
, Issue.2
-
-
Manju, S.1
Punithavalli, M.2
-
21
-
-
26444601262
-
Cooperative Multi-Agent Learning: The State of the Art
-
Springer
-
L. Panait, S. Luke, Cooperative Multi-Agent Learning: The State of the Art, Autonomous Agents and Multi-Agent Systems, vol. 11(3), Springer, 2005, pp. 387-434.
-
(2005)
Autonomous Agents and Multi-Agent Systems
, vol.11
, Issue.3
, pp. 387-434
-
-
Panait, L.1
Luke, S.2
-
22
-
-
63749120226
-
Network intrusion detection design using feature selection of soft computing paradigms
-
Chou T.S., Yen K.K., Luo J. Network intrusion detection design using feature selection of soft computing paradigms. Int. J. Computat. Intell. 2008, 4(3):196-208.
-
(2008)
Int. J. Computat. Intell.
, vol.4
, Issue.3
, pp. 196-208
-
-
Chou, T.S.1
Yen, K.K.2
Luo, J.3
-
23
-
-
0242302657
-
-
Elsevier, December
-
M. Dash, H. Liu, Consistency-based Search in Feature Selection, vol. 151(1-2), Elsevier, December 2003, pp. 155-176.
-
(2003)
Consistency-based Search in Feature Selection
, vol.151
, Issue.1-2
, pp. 155-176
-
-
Dash, M.1
Liu, H.2
-
24
-
-
78751604427
-
An efficient classifier design integrating rough set and set oriented database operations
-
Elsevier, Science Direct
-
Das A.K., Sil J. An efficient classifier design integrating rough set and set oriented database operations. Appl. Soft Comput. J. 2011, 11:2279-2285. Elsevier, Science Direct.
-
(2011)
Appl. Soft Comput. J.
, vol.11
, pp. 2279-2285
-
-
Das, A.K.1
Sil, J.2
-
25
-
-
0012904462
-
Rough sets methods in feature reduction and classification
-
Swiniarski R.W. Rough sets methods in feature reduction and classification. Int. J. Appl. Math. Comput. Sci. 2001, 11(3):565-582.
-
(2001)
Int. J. Appl. Math. Comput. Sci.
, vol.11
, Issue.3
, pp. 565-582
-
-
Swiniarski, R.W.1
-
26
-
-
84872146806
-
Feature selection with rough sets for web page classification
-
SpringerLink Publishers
-
Huang Y., Huang X., Cercone N. Feature selection with rough sets for web page classification. Transactions on Rough Sets 2004, vol. 2. SpringerLink Publishers, pp. 1-13.
-
(2004)
Transactions on Rough Sets
, vol.2
, pp. 1-13
-
-
Huang, Y.1
Huang, X.2
Cercone, N.3
-
29
-
-
84876732188
-
-
http://www.iscx.ca/NSL-KDD/.
-
-
-
|