-
1
-
-
84865209539
-
A network intrusion detection system based on a hidden naïve bayes multiclass classifier
-
Levent Koc,Thomas A.Mazzuchi,and Shahrao.m.Sarkani, " A network intrusion detection system based on a hidden naïve bayes multiclass classifier",Expert Systems with Applications,39(18),pp.13492-13500,2012.
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.18
, pp. 13492-13500
-
-
Koc, L.1
Mazzuchi, T.A.2
Sarkani, S.M.3
-
2
-
-
81855221688
-
Decision tree based light weight intrusion detection using a wrapper approach
-
Siva S.Sivatha Sindhu, S.Geetha and A.Kannan," Decision tree based light weight intrusion detection using a wrapper approach", Expert Systems with Applications,39(1), pp.129-141, 2012.
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.1
, pp. 129-141
-
-
Sivatha Sindhu, S.S.1
Geetha, S.2
Kannan, A.3
-
3
-
-
19944364877
-
Feature deduction and ensemble
-
Chebrolu S, Abraham A,Thomas J P,"Feature deduction and ensemble", Design of Intrusion Detection System, Computer and Security,24(4),pp.295-307,2005
-
(2005)
Design of Intrusion Detection System, Computer and Security
, vol.24
, Issue.4
, pp. 295-307
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
4
-
-
34247636165
-
Genetic-fuzzy rule reordering in mining approach and evaluation of feature selection techniques for anomaly intrusion detection
-
Tsang, C. H., Kwong, S., & Wang, H.," Genetic-fuzzy rule reordering in mining approach and evaluation of feature selection techniques for anomaly intrusion detection", Pattern Recognition,40 (9), pp. 2373-2391, 2007.
-
(2007)
Pattern Recognition
, vol.40
, Issue.9
, pp. 2373-2391
-
-
Tsang, C.H.1
Kwong, S.2
Wang, H.3
-
5
-
-
70449353683
-
Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree
-
N.B. Annur, H.Sallehudin,A.Gani and O.Zakari, "Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree", Malaysian Journal of Computer Science,21(2), pp.101-115,2008.
-
(2008)
Malaysian Journal of Computer Science
, vol.21
, Issue.2
, pp. 101-115
-
-
Annur, N.B.1
Sallehudin, H.2
Gani, A.3
Zakari, O.4
-
7
-
-
33750514606
-
Modeling IDS using hybrid intelligent systems
-
S.Peddabachigari, A.Abraham, C.Grosan and J.Thomas, "Modeling IDS using hybrid intelligent systems", Journal of network and computer applications,30(1),pp.114-132,2007.
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 114-132
-
-
Peddabachigari, S.1
Abraham, A.2
Grosan, C.3
Thomas, J.4
-
8
-
-
10844230994
-
Intrusion detection using an ensemble of intelligent paradigms
-
S.Mukkamala, A.H.Sung and A.Abraham,"Intrusion detection using an ensemble of intelligent paradigms", Journal of network and computer applications,28(2),pp.167-182,2005.
-
(2005)
Journal of Network and Computer Applications
, vol.28
, Issue.2
, pp. 167-182
-
-
Mukkamala, S.1
Sung, A.H.2
Abraham, A.3
-
10
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
San Francisco,CA
-
Aleksandar Lazarevic, Levent Ertoz, Aysel Ozgur, Vipin Kumar,Jaideep Srivastava,"A comparative study of anomaly detection schemes in network intrusion detection", Proceedings of the third SIAM International Conferences on data mining, San Francisco,CA,2003.
-
(2003)
Proceedings of the Third SIAM International Conferences on Data Mining
-
-
Lazarevic, A.1
Ertoz, L.2
Ozgur, A.3
Kumar, V.4
Srivastava, J.5
-
13
-
-
0141464248
-
HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification
-
Zhang Z, HIDE: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification", InProceedings of the IEEE Workshop on information assurance and security, pp,85-90,2001.
-
(2001)
InProceedings of the IEEE Workshop on Information Assurance and Security
, pp. 85-90
-
-
Zhang, Z.1
-
16
-
-
50649094035
-
Random-forests based network Intrusion detection systems
-
Zhang J., Zulkerine,M., & Haque,A."Random-forests based network Intrusion detection systems, IEEE Transactions on Systems, Man and cybernetics, Part C:Applications and Reviews, 38(5), 649-659, 2008.
-
(2008)
IEEE Transactions on Systems, Man and Cybernetics, Part C:Applications and Reviews
, vol.38
, Issue.5
, pp. 649-659
-
-
Zhang, J.1
Zulkerine, M.2
Haque, A.3
-
17
-
-
0009011405
-
Detecting novel network intrusions using Bayes estimators
-
Chicago
-
Barbara D.,Wu,N., & Jajodia,S, "Detecting novel network intrusions using Bayes estimators", In Paper presented at the first SIAM conference on data mining,Chicago,2001.
-
(2001)
Paper Presented at the First SIAM Conference on Data Mining
-
-
Barbara, D.1
Wu, N.2
Jajodia, S.3
-
18
-
-
0032676506
-
A data mining framework for building Intrusion detection models
-
Lee, W.Stolfo,S.J., & Mok,K.W, "A data mining framework for building Intrusion detection models", In Proceedings of the IEEE symposium on security and privacy, pp.120-132,1999.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
19
-
-
58349096877
-
Data mining based intrusion detectors
-
Wu., S & Yen.E, "Data mining based intrusion detectors", Expert SystemswithApplications,3(1),pp.5605-5612,2009.
-
(2009)
Expert SystemswithApplications
, vol.3
, Issue.1
, pp. 5605-5612
-
-
Wu, S.1
Yen, E.2
-
20
-
-
0031334221
-
Selection of relevant features and examples in machine learning
-
Blum, A., & Langley, P, "Selection of relevant features and examples in machine learning", Artificial Intelligence,97(1),45-271,1997.
-
(1997)
Artificial Intelligence
, vol.97
, Issue.1
, pp. 45-271
-
-
Blum, A.1
Langley, P.2
-
21
-
-
77950575061
-
A detailed analysis of the kdd cup 99 data set
-
M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, "A Detailed Analysis of the KDD CUP 99 Data Set," Second IEEE Symposium on Computational Intelligence for Security and Defense Applications(CISDA), 2009.
-
(2009)
Second IEEE Symposium on Computational Intelligence for Security and Defense Applications(CISDA)
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.4
-
22
-
-
84945261048
-
Multiclass alternating decision trees
-
Geoffrey Holmes, Bernhard Pfahringer, Richard Kirkby, Eibe Frank, Mark Hall, " Multiclass alternating decision trees," Proceedings of the 13th European Conference on Machine Learning", 161-172,2002.
-
(2002)
Proceedings of the 13th European Conference on Machine Learning
, pp. 161-172
-
-
Holmes, G.1
Pfahringer, B.2
Kirkby, R.3
Frank, E.4
Hall, M.5
-
25
-
-
0004118981
-
-
Technical Report, Computer Science Laboratory, SRI International
-
H.S. Javitz, and A. Valdes, The NIDES Statistical Component: Description and Justification, Technical Report, Computer Science Laboratory, SRI International, 1993.
-
(1993)
The NIDES Statistical Component: Description and Justification
-
-
Javitz, H.S.1
Valdes, A.2
-
26
-
-
76749118521
-
-
Technical Report, Computer Science Learning
-
I. Guyon, A. Saffari, G. Dror, and G. Cawley, "Model selection: Description and Justification, Technical Report, Computer Science Learning, vol. 11, pp. 61-87, 2010.
-
(2010)
Model Selection: Description and Justification
, vol.11
, pp. 61-87
-
-
Guyon, I.1
Saffari, A.2
Dror, G.3
Cawley, G.4
|