-
1
-
-
28744437197
-
GMDH-based feature ranking and selection for improved classification of medical data
-
DOI 10.1016/j.jbi.2005.03.003, PII S153204640500033X
-
R. Abdel-Aal GMDH-based feature ranking and selection for improved classification of medical data J. Biomed. Inf. 38 6 2005 456 468 (Pubitemid 41758095)
-
(2005)
Journal of Biomedical Informatics
, vol.38
, Issue.6
, pp. 456-468
-
-
Abdel-Aal, R.E.1
-
2
-
-
43549109105
-
Abductive networks for two-group classification a comparison with neural networks
-
A. Agarwal Abductive networks for two-group classification a comparison with neural networks J. Appl. Bus. Res. 15 1999 1 12
-
(1999)
J. Appl. Bus. Res.
, vol.15
, pp. 1-12
-
-
Agarwal, A.1
-
7
-
-
16244423656
-
Comparative experiments on learning information extractors for proteins and their interactions
-
DOI 10.1016/j.artmed.2004.07.016, Information Extraction and Summarization from Medical Documents
-
R. Bunescu, R. Ge, R. Kate, E. Marcotte, and R. Mooney Comparative experiments on learning information extractors for proteins and their interactions Artif. Intell. Med. 33 2 2005 139 155 (Pubitemid 40462453)
-
(2005)
Artificial Intelligence in Medicine
, vol.33
, Issue.2
, pp. 139-155
-
-
Bunescu, R.1
Ge, R.2
Kate, R.J.3
Marcotte, E.M.4
Mooney, R.J.5
Ramani, A.K.6
Wong, Y.W.7
-
9
-
-
40649104787
-
Attack characterization and intrusion detection using an ensemble of self-organizing maps
-
DeLooze, L.; 2006. Attack characterization and intrusion detection using an ensemble of self-organizing maps. In: Proceedings of the IEEE Information Assurance Workshop.
-
(2006)
Proceedings of the IEEE Information Assurance Workshop
-
-
Delooze, L.1
-
10
-
-
25844491810
-
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
-
DOI 10.1016/j.eswa.2005.05.002, PII S0957417405000989
-
O. Depren, M. Topallar, E. Anarim, and M. Ciliz An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks Expert Syst. Appl. 29 4 2005 713 722 (Pubitemid 41394445)
-
(2005)
Expert Systems with Applications
, vol.29
, Issue.4
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Ciliz, M.K.4
-
11
-
-
34250185435
-
Neural networks learning improvement using the k-means clustering algorithm to detect network intrusions
-
K. Faraoun, and A. Boukelif Neural networks learning improvement using the k-means clustering algorithm to detect network intrusions Int. J. Comput. Intell. 3 2 2006 161 168
-
(2006)
Int. J. Comput. Intell.
, vol.3
, Issue.2
, pp. 161-168
-
-
Faraoun, K.1
Boukelif, A.2
-
12
-
-
0343624610
-
The GMDH algorithm of Ivakhnenko
-
S.J. Farlow The GMDH algorithm of Ivakhnenko Am. Stat. 35 1981 210 215
-
(1981)
Am. Stat.
, vol.35
, pp. 210-215
-
-
Farlow, S.J.1
-
15
-
-
0001373628
-
Random neural networks with negative and positive signals and product form solution
-
E. Gelenbe Random neural networks with negative and positive signals and product form solution Neural Comput. 1 4 1989 502 510
-
(1989)
Neural Comput.
, vol.1
, Issue.4
, pp. 502-510
-
-
Gelenbe, E.1
-
16
-
-
0000145931
-
Stability of the random neural network model
-
E. Gelenbe Stability of the random neural network model Neural Comput. 2 2 1990 239 247
-
(1990)
Neural Comput.
, vol.2
, Issue.2
, pp. 239-247
-
-
Gelenbe, E.1
-
19
-
-
0001784588
-
Group method of data handling - A rival of the method of stochastic approximation
-
A. Ivakhnenko Group method of data handling - a rival of the method of stochastic approximation Sov. Autom. Control 13 1966 43 71
-
(1966)
Sov. Autom. Control
, vol.13
, pp. 43-71
-
-
Ivakhnenko, A.1
-
22
-
-
1642482061
-
Assessing the rental value of residential properties an abductive learning networks approach
-
K.S. Kim, and W.A. Nelson Assessing the rental value of residential properties an abductive learning networks approach J. R. Estate Res. 12 1 1996 63 77
-
(1996)
J. R. Estate Res.
, vol.12
, Issue.1
, pp. 63-77
-
-
Kim, K.S.1
Nelson, W.A.2
-
26
-
-
0003086646
-
Abductive reasoning networks
-
G. Montgomery, and K. Drake Abductive reasoning networks Neurocomputing 2 1991 97 104
-
(1991)
Neurocomputing
, vol.2
, pp. 97-104
-
-
Montgomery, G.1
Drake, K.2
-
28
-
-
35648969617
-
A denial of service detector based on maximum likelihood detection and the random neural network
-
G. Oke, and G. Loukas A denial of service detector based on maximum likelihood detection and the random neural network Comput. J. 50 6 2007 717
-
(2007)
Comput. J.
, vol.50
, Issue.6
, pp. 717
-
-
Oke, G.1
Loukas, G.2
-
35
-
-
85012240666
-
Data mining-based intrusion detectors an overview of the columbia IDS project
-
S.J. Stolfo, W. Lee, P.K. Chan, W. Fan, and E. Eskin Data mining-based intrusion detectors an overview of the columbia IDS project ACM SIGMOD Record 30 4 2001 5 14
-
(2001)
ACM SIGMOD Record
, vol.30
, Issue.4
, pp. 5-14
-
-
Stolfo, S.J.1
Lee, W.2
Chan, P.K.3
Fan, W.4
Eskin, E.5
-
36
-
-
77950575061
-
A detailed analysis of the KDD CUP 99 data set
-
IEEE Press
-
Tavallaee, M.; Bagheri, E.; Lu, W.; Ghorbani, A.; 2009. A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the Second IEEE International Conference on Computational Intelligence for Security and Defense Applications, IEEE Press, pp. 53-58.
-
(2009)
Proceedings of the Second IEEE International Conference on Computational Intelligence for Security and Defense Applications
, pp. 53-58
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.4
-
38
-
-
77956394469
-
-
Machine Learning Group, University of Waikato
-
WEKA Data Mining Software, Machine Learning Group, University of Waikato Available at: 〈 http://www.cs.waikato.ac.nz/ml/weka/index. html âŒ.
-
WEKA Data Mining Software
-
-
-
40
-
-
49549120416
-
An adaptive automatically tuning intrusion detection system
-
Z. Yu, J. Tsai, and T. Weigert An adaptive automatically tuning intrusion detection system ACM Trans. Auton. Adapt. Syst. 3 2008 10:1 10:25
-
(2008)
ACM Trans. Auton. Adapt. Syst.
, vol.3
, pp. 101-1025
-
-
Yu, Z.1
Tsai, J.2
Weigert, T.3
-
41
-
-
82155167665
-
Distributed intrusion detection system in a multi-layer network architecture of smart grids
-
Y. Zhang, L. Wang, W. Sun, R.C.G. II, and M. Alam Distributed intrusion detection system in a multi-layer network architecture of smart grids IEEE Trans. Smart Grid 2 2011 796 808
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, pp. 796-808
-
-
Zhang, Y.1
Wang, L.2
Sun, W.3
Ii, R.C.G.4
Alam, M.5
|