-
2
-
-
76949094859
-
Network-based intrusion detection with support vector machines
-
Springer Berlin Heidelberg,.
-
Kim, Dong Seong, and Jong Sou Park. "Network-based intrusion detection with support vector machines. " Information Networking. Springer Berlin Heidelberg, 2003.
-
(2003)
Information Networking
-
-
Kim, D.S.1
Park, J.S.2
-
3
-
-
0141607824
-
Latent dirichlet allocation
-
Blei, David M., Andrew Y. Ng, and Michael I. Jordan. "Latent dirichlet allocation. " the Journal of machine Learning research, Volume 3, pp. 993-1022, 2003.
-
(2003)
The Journal of Machine Learning Research
, vol.3
, pp. 993-1022
-
-
Blei, D.M.1
Ng, A.Y.2
Jordan, M.I.3
-
7
-
-
32144440812
-
Linear discriminant analysis in network traffic modeling
-
Bing-Yi Zhang, Ya-Min Sun, Yu-Lan, Bian, Hong Ke Zhang, "Linear Discriminant Analysis in network traffic modeling", International Journal of Communication Systems", Volume 19, Issue 1, pp. 53-65, 2006.
-
(2006)
International Journal of Communication Systems
, vol.19
, Issue.1
, pp. 53-65
-
-
Zhang, B.-Y.1
Sun, Y.-M.2
Bian, Y.-L.3
Zhang, H.K.4
-
8
-
-
79960290786
-
Network intrusion detection using genetic algorithm and neural network
-
A. Gomathy and B. Lakshmi, "Network intrusion detection using Genetic algorithm and Neural Network", Communications in Computer and Information Science, Volume 198, pp. 399-408, 2011.
-
(2011)
Communications in Computer and Information Science
, vol.198
, pp. 399-408
-
-
Gomathy, A.1
Lakshmi, B.2
-
9
-
-
81855221688
-
Decision tree based light weight intrusion detection using a wrapper approach
-
Siva S, Sivatha Sindhu, S. Geetha, A. Kannan, "Decision tree based light weight intrusion detection using a wrapper approach", Expert Systems with applications, Volume 39, pp. 129-141, 2012.
-
(2012)
Expert Systems with Applications
, vol.39
, pp. 129-141
-
-
Siva, S.1
Sindhu, S.2
Geetha, S.3
Kannan, A.4
-
10
-
-
84856226719
-
An ensemble design of intrusion detection system for handling uncertainity using neutrosophic logicclassifier
-
B. Kavitha, S. Karthikeyan, P. Sheeba Maybell, "An ensemble design of intrusion detection system for handling uncertainity using neutrosophic logicclassifier", Knowledge based systems, Volume 28, pp. 88-96, 2012.
-
(2012)
Knowledge Based Systems
, vol.28
, pp. 88-96
-
-
Kavitha, B.1
Karthikeyan, S.2
Sheeba Maybell, P.3
-
11
-
-
84899046063
-
Spam detection using g-lda
-
Saini, Shubham, Bhavesh Kasliwal, and Shraey Bhatia. "Spam Detection using G-LDA. " International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 10, pp. 406-409, 2013.
-
(2013)
International Journal of Advanced Research in Computer Science and Software Engineering
, vol.3
, Issue.10
, pp. 406-409
-
-
Saini, S.1
Kasliwal, B.2
Bhatia, S.3
-
12
-
-
84899098979
-
-
Cup, K. D. D. "Available on: http: //kdd. ics. uci. edu/databases/kddcup 99/kddcup99. html. ", 2007.
-
(2007)
-
-
Cup, K.D.D.1
-
14
-
-
33847704184
-
A novel method for supervised anomaly detection by cascading k-means clustering and id3 deicsion tree learning methods
-
Shekhar R Gaddam, Vir V Phoha and Kiran S Balagani, "A novel method for supervised anomaly detection by cascading K-Means clustering and ID3 deicsion tree learning methods", IEEE transactions on knowledge and data engineering, Volume. 19, pp. 345-354, 2007.
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, pp. 345-354
-
-
Gaddam, S.R.1
Phoha, V.V.2
Balagani, K.S.3
-
16
-
-
33847218306
-
On the combination of naive bayes and decision trees for intrusion detection
-
Benferhat, S. and Tabia, K., "On the combination of Naive Bayes and decision trees for intrusion detection", International Conference on Intelligent Agents, Web Technologies and Internet Commerce, Volume 1, pp. 211-216, 2006.
-
(2006)
International Conference on Intelligent Agents, Web Technologies and Internet Commerce
, vol.1
, pp. 211-216
-
-
Benferhat, S.1
Tabia, K.2
-
17
-
-
33749058745
-
Design of multiple-level hybrid classi er for intrusion detection system
-
Xiang, C., and Lim, S. M, "Design of multiple-level hybrid classier for intrusion detection system", IEEE Transaction on System, Man and Cybernetics, Part A: Cybernetics, Volume 2, pp. 117-122, 2005.
-
(2005)
IEEE Transaction on System, Man and Cybernetics, Part A: Cybernetics
, vol.2
, pp. 117-122
-
-
Xiang, C.1
Lim, S.M.2
|