-
1
-
-
47249156145
-
Using ant colony optimization-based selected features for predicting post-synaptic activity in proteins
-
M.E. Basiri, N. Ghasem-Aghaee, and M.H. Aghdam Using ant colony optimization-based selected features for predicting post-synaptic activity in proteins Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics, Lecture Notes in Computer Science 4973 2008 12 23
-
(2008)
Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics, Lecture Notes in Computer Science
, vol.4973
, pp. 12-23
-
-
Basiri, M.E.1
Ghasem-Aghaee, N.2
Aghdam, M.H.3
-
2
-
-
79151484606
-
Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset
-
V. Bolon-Canedo, N. Sanchez-Marono, and A. Alonso-Betanzos Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset Expert Systems with Applications 38 5 2011 5947 5957
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.5
, pp. 5947-5957
-
-
Bolon-Canedo, V.1
Sanchez-Marono, N.2
Alonso-Betanzos, A.3
-
5
-
-
25844491810
-
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
-
O. Depren, M. Topallar, E. Anarim, and M.K. Ciliz An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks Expert Systems with Applications 29 4 2005 713 722
-
(2005)
Expert Systems with Applications
, vol.29
, Issue.4
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Ciliz, M.K.4
-
7
-
-
84871274979
-
Biological versus electronic adaptive coloration: How can one inform the other
-
K. Eric, M.M. Lydia, T.H. Roger, B.D. Patrick, R.N. Rajesh, and F. Eric Biological versus electronic adaptive coloration: how can one inform the other Journal of the Royal Society Interface 2012 10.1098/rsif.2012.0601
-
(2012)
Journal of the Royal Society Interface
-
-
Eric, K.1
Lydia, M.M.2
Roger, T.H.3
Patrick, B.D.4
Rajesh, R.N.5
Eric, F.6
-
8
-
-
1042275194
-
-
Center for Applied Scientific Computing. Lawrence Livermore National Laboratory
-
Fodor, I. K. (2002). A survey of dimension reduction techniques. Center for Applied Scientific Computing. Lawrence Livermore National Laboratory.
-
(2002)
A Survey of Dimension Reduction Techniques
-
-
Fodor, I.K.1
-
9
-
-
77956613687
-
A novel intrusion detection system based on hierarchical clustering and support vector machines
-
S.-J. Horng, M.-Y. Su, Y.-H. Chen, T.-W. Kao, R.-J. Chen, and J.-L. Lai A novel intrusion detection system based on hierarchical clustering and support vector machines Expert Systems with Application 38 1 2011 306 313
-
(2011)
Expert Systems with Application
, vol.38
, Issue.1
, pp. 306-313
-
-
Horng, S.-J.1
Su, M.-Y.2
Chen, Y.-H.3
Kao, T.-W.4
Chen, R.-J.5
Lai, J.-L.6
-
10
-
-
56349158810
-
Signature based intrusion detection using latent semantic analysis
-
IJCNN 2008 (IEEE world congress on computational intelligence) IEEE International Joint Conference
-
Lassez, J.-L., Rossi, R., Sheel, S., & Mukkamala, S. (2008) Signature based intrusion detection using latent semantic analysis. In Neural networks, 2008. IJCNN 2008 (IEEE world congress on computational intelligence) IEEE International Joint Conference.
-
(2008)
Neural Networks, 2008
-
-
Lassez, J.-L.1
Rossi, R.2
Sheel, S.3
Mukkamala, S.4
-
11
-
-
84870713037
-
Intrusion detection system: A comprehensive review
-
H.-J. Liao, C.-H.R. Lin, Y.-C. Lin, and K.-Y. Tung Intrusion detection system: A comprehensive review Journal of Network and Computer Applications 36 1 2013 16 24
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.1
, pp. 16-24
-
-
Liao, H.-J.1
Lin, C.-H.R.2
Lin, Y.-C.3
Tung, K.-Y.4
-
12
-
-
84864772502
-
An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection
-
S.-W. Lin, K.-C. Ying, C.-Y. Lee, and Z.-J. Lee An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection Applied Soft Computing 12 10 2012 3285 3290
-
(2012)
Applied Soft Computing
, vol.12
, Issue.10
, pp. 3285-3290
-
-
Lin, S.-W.1
Ying, K.-C.2
Lee, C.-Y.3
Lee, Z.-J.4
-
16
-
-
8344282137
-
Book review: C4.5: Programs for machine learning by J. Ross Quinlan
-
S.L. Salzberg Book review: C4.5: Programs for machine learning by J. Ross Quinlan Machine Learning 16 1994 235 240
-
(1994)
Machine Learning
, vol.16
, pp. 235-240
-
-
Salzberg, S.L.1
-
18
-
-
34247636165
-
Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection
-
C.-H. Tsang, S. Kwong, and H. Wang Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection Pattern Recognition 40 9 2007 2373 2391
-
(2007)
Pattern Recognition
, vol.40
, Issue.9
, pp. 2373-2391
-
-
Tsang, C.-H.1
Kwong, S.2
Wang, H.3
-
20
-
-
84941079784
-
A new approach to intrusion detection using artificial neural networks and fuzzy clustering
-
G. Wang, J. Hao, J. Ma, and L. Huang A new approach to intrusion detection using artificial neural networks and fuzzy clustering Expert Systems with Applications 37 9 2010 6225 6232
-
(2010)
Expert Systems with Applications
, vol.37
, Issue.9
, pp. 6225-6232
-
-
Wang, G.1
Hao, J.2
Ma, J.3
Huang, L.4
|