-
1
-
-
69249230890
-
Intrusion detection by machine learning: A review
-
Tsai, C., Hsu, Y., Lin, C., Lin, W.: Intrusion detection by machine learning: A review. Expert Systems with Applications 36(10), 11994-12000 (2009)
-
(2009)
Expert Systems With Applications
, vol.36
, Issue.10
, pp. 11994-12000
-
-
Tsai, C.1
Hsu, Y.2
Lin, C.3
Lin, W.4
-
2
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion-detection systems. Computer Networks 31(8), 805-822 (1999)
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
3
-
-
15944386957
-
Dimension Reduction Using Feature Extraction Methods for Real-time Misuse Detection Systems
-
Kuchimanchi, G., Phoha, V., Balagani, K., Gaddam, S.: Dimension Reduction Using Feature Extraction Methods for Real-time Misuse Detection Systems. In: Proceedings of the Fifth Annual IEEE SMC Information Assurance Workshop, pp. 195-202 (2004)
-
(2004)
Proceedings of the Fifth Annual IEEE SMC Information Assurance Workshop
, pp. 195-202
-
-
Kuchimanchi, G.1
Phoha, V.2
Balagani, K.3
Gaddam, S.4
-
4
-
-
81855197007
-
An efficient intrusion detection system based on support vector machines and gradually feature removal method
-
Li, Y., Xia, J., Zhang, S., Yan, J., Ai, X., Dai, K.: An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Systems with Applications 39(1), 424-430 (2012)
-
(2012)
Expert Systems With Applications
, vol.39
, Issue.1
, pp. 424-430
-
-
Li, Y.1
Xia, J.2
Zhang, S.3
Yan, J.4
Ai, X.5
Dai, K.6
-
5
-
-
79956097533
-
Mutual informationbased feature selection for intrusion detection systems
-
Amiri, F., Yousefi, M., Lucas, C., Shakery, A., Yazdani, N.: Mutual informationbased feature selection for intrusion detection systems. Journal of Network and Computer Applications 34(4), 1184-1199 (2011)
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.4
, pp. 1184-1199
-
-
Amiri, F.1
Yousefi, M.2
Lucas, C.3
Shakery, A.4
Yazdani, N.5
-
6
-
-
78149289039
-
Feature selection for clustering-a filter solution
-
Dash, M., Choi, K., Scheuermann, P., Liu, H.: Feature selection for clustering-a filter solution. In: Proceedings of the Second International Conference on Data Mining, pp. 115-122 (2002)
-
(2002)
Proceedings of the Second International Conference On Data Mining
, pp. 115-122
-
-
Dash, M.1
Choi, K.2
Scheuermann, P.3
Liu, H.4
-
8
-
-
34247636165
-
Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection
-
Tsang, C., Kwong, S., Wang, H.: Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection. Pattern Recognition 40(9), 2373-2391 (2007)
-
(2007)
Pattern Recognition
, vol.40
, Issue.9
, pp. 2373-2391
-
-
Tsang, C.1
Kwong, S.2
Wang, H.3
-
9
-
-
84883046231
-
A Real-Time Anomaly Network Intrusion Detection System with High Accuracy
-
Elngar, A., Mohamed, D., Ghaleb, F.: A Real-Time Anomaly Network Intrusion Detection System with High Accuracy. Information Sciences Letters International Journal 2(2), 49-56 (2013)
-
(2013)
Information Sciences Letters International Journal
, vol.2
, Issue.2
, pp. 49-56
-
-
Elngar, A.1
Mohamed, D.2
Ghaleb, F.3
-
10
-
-
25144492516
-
Efficient Feature Selection via Analysis of Relevance and Redundancy
-
Yu, L., Liu, H.: Efficient Feature Selection via Analysis of Relevance and Redundancy. Journal of Machine Learning Research 5(1), 1205-1224 (2004)
-
(2004)
Journal of Machine Learning Research
, vol.5
, Issue.1
, pp. 1205-1224
-
-
Yu, L.1
Liu, H.2
-
12
-
-
0034593107
-
Feature selection for unsupervised learning via evolutionary search
-
Kim, Y., Street, W., Menczer, F.: Feature selection for unsupervised learning via evolutionary search. In: Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 365-369 (2000)
-
(2000)
Proceedings of the Sixth ACM SIGKDD International Conference On Knowledge Discovery and Data Mining
, pp. 365-369
-
-
Kim, Y.1
Street, W.2
Menczer, F.3
-
13
-
-
0031381525
-
Wrappers for feature subset selection
-
Kohavi, R., John, G.H.: Wrappers for feature subset selection. Artificial Intelligence 1(2), 273-324 (1997)
-
(1997)
Artificial Intelligence
, vol.1
, Issue.2
, pp. 273-324
-
-
Kohavi, R.1
John, G.H.2
-
14
-
-
24344458137
-
Feature selection based on mutual information criteria of max-dependency, max-relevance, and min redundancy
-
Peng, H., Long, F., Ding, C.: Feature selection based on mutual information criteria of max-dependency, max-relevance, and min redundancy. IEEE Transactions on Pattern Analysis and Machine Intelligence 27(8), 1226-1238 (2005)
-
(2005)
IEEE Transactions On Pattern Analysis and Machine Intelligence
, vol.27
, Issue.8
, pp. 1226-1238
-
-
Peng, H.1
Long, F.2
Ding, C.3
-
15
-
-
33745771538
-
Machine learning techniques and chi-square feature selection for cancer classification using SAGE gene expression profiles
-
In: Li, J., Yang, Q., Tan, A.-H. (eds.), Springer, Heidelberg
-
Jin, X., Xu, A., Bie, R., Guo, P.: Machine learning techniques and chi-square feature selection for cancer classification using SAGE gene expression profiles. In: Li, J., Yang, Q., Tan, A.-H. (eds.) BioDM 2006. LNCS (LNBI), vol. 3916, pp. 106-115. Springer, Heidelberg (2006)
-
(2006)
BioDM 2006. LNCS (LNBI)
, vol.3916
, pp. 106-115
-
-
Jin, X.1
Xu, A.2
Bie, R.3
Guo, P.4
-
16
-
-
0001500753
-
Pattern recognition and reduction of dimensionality
-
North-Holland, Amsterdam
-
Ben-Bassat, M.: Pattern recognition and reduction of dimensionality. In: Handbook of Statistics II, vol. 1, North-Holland, Amsterdam (1982)
-
(1982)
Handbook of Statistics II
, vol.1
-
-
Ben-Bassat, M.1
-
18
-
-
33744584654
-
Induction of Decision Trees
-
Quinlan, J.R.: Induction of Decision Trees. Machine Learning 1(1), 81-106 (1986)
-
(1986)
Machine Learning
, vol.1
, Issue.1
, pp. 81-106
-
-
Quinlan, J.R.1
-
19
-
-
70350044841
-
Intrusion detection based on Hybrid propagation in Bayesian Networks
-
Jemili, F., Zaghdoud, M., Ahmed, M.: Intrusion detection based on Hybrid propagation in Bayesian Networks. In: Proceedings of the IEEE International Conference on Intelligence and Security Informatics, pp. 137-142 (2009)
-
(2009)
Proceedings of the IEEE International Conference On Intelligence and Security Informatics
, pp. 137-142
-
-
Jemili, F.1
Zaghdoud, M.2
Ahmed, M.3
-
20
-
-
0003474751
-
-
Cambridge University Press, Cambridge
-
Press, W.H., Teukolsky, S.A., Vetterling, W.T., Flannery, B.P.: Numerical recipes in C. The art of scientific computing. Cambridge University Press, Cambridge (1988)
-
(1988)
Numerical Recipes In C. the Art of Scientific Computing
-
-
Press, W.H.1
Teukolsky, S.A.2
Vetterling, W.T.3
Flannery, B.P.4
-
21
-
-
77950575061
-
A Detailed Analysis of the KDD CUP 99 Data Set
-
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A Detailed Analysis of the KDD CUP 99 Data Set. In: Proceeding of IEEE Symposium on Computational Intelligence in Security and Defense Application, CISDA (2009)
-
(2009)
Proceeding of IEEE Symposium On Computational Intelligence In Security and Defense Application, CISDA
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.A.4
-
22
-
-
84904702506
-
-
KDD'99 dataset, Irvine, CA, USA (July
-
KDD'99 dataset, Irvine, CA, USA (July 2010), http://kdd.ics.uci.edu/databases
-
(2010)
-
-
-
23
-
-
0003922190
-
-
2nd edn. JohnWiley & Sons, USA
-
Duda, R.O., Hart, P.E., Stork, P.E.: Pattern Classification, 2nd edn. JohnWiley & Sons, USA (2001)
-
(2001)
Pattern Classification
-
-
Duda, R.O.1
Hart, P.E.2
Stork, P.E.3
|