-
1
-
-
84915760589
-
Using response action with intelligent intrusion detection and prevention system against web application malware
-
Alazab A., Hobbs M., Abawajy J., Khraisat A., Alazab M. Using response action with intelligent intrusion detection and prevention system against web application malware Information Management & Computer Security 22 2014 431 449
-
(2014)
Information Management & Computer Security
, vol.22
, pp. 431-449
-
-
Alazab, A.1
Hobbs, M.2
Abawajy, J.3
Khraisat, A.4
Alazab, M.5
-
2
-
-
84864486823
-
A new automatic target recognition system based on wavelet extreme learning machine
-
Avci E., Coteli R. A new automatic target recognition system based on wavelet extreme learning machine Expert Systems with Applications 39 16 2012 12340 12348
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.16
, pp. 12340-12348
-
-
Avci, E.1
Coteli, R.2
-
5
-
-
84919327055
-
A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems
-
Eesa A.S., Orman Z., Brifcani A.M.A. A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems Expert Systems with Applications 42 5 2015 2670 2679
-
(2015)
Expert Systems with Applications
, vol.42
, Issue.5
, pp. 2670-2679
-
-
Eesa, A.S.1
Orman, Z.2
Brifcani, A.M.A.3
-
7
-
-
79960556588
-
Alert correlation in collaborative intelligent intrusion detection systems - A survey
-
Elshoush H.T., Osman I.M. Alert correlation in collaborative intelligent intrusion detection systems - A survey Applied Soft Computing Journal 11 7 2011 4349 4365
-
(2011)
Applied Soft Computing Journal
, vol.11
, Issue.7
, pp. 4349-4365
-
-
Elshoush, H.T.1
Osman, I.M.2
-
8
-
-
84878825414
-
An adaptive ensemble classifier for mining concept drifting data streams
-
Farid D.M., Zhang L., Hossain A., Rahman C.M., Strachan R., Sexton G., Dahal K. An adaptive ensemble classifier for mining concept drifting data streams Expert Systems with Applications 40 15 2013 5895 5906
-
(2013)
Expert Systems with Applications
, vol.40
, Issue.15
, pp. 5895-5906
-
-
Farid, D.M.1
Zhang, L.2
Hossain, A.3
Rahman, C.M.4
Strachan, R.5
Sexton, G.6
Dahal, K.7
-
9
-
-
41749107387
-
AdaBoost-based algorithm for network intrusion detection system
-
Hu W., Maybank S. AdaBoost-based algorithm for network intrusion detection system IEEE Transactions on Systems, Man, and Cybernetics 38 2 2008 577 583
-
(2008)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.38
, Issue.2
, pp. 577-583
-
-
Hu, W.1
Maybank, S.2
-
11
-
-
84865090469
-
-
Last accessed on December, 1
-
KDDCup dataset (1999). http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Last accessed on December, 1 2014.
-
(1999)
KDDCup Dataset
-
-
-
12
-
-
84940465919
-
-
Kyoto University Benchmark Dataset (2009). Last Accessed on 14 May, 2015
-
Kyoto University Benchmark Dataset (2009). http://www.takakura.com/Kyoto-data/. Last Accessed on 14 May, 2015.
-
-
-
-
13
-
-
34047174077
-
A fast and accurate online sequential learning algorithm for feedforward networks
-
Liang N.Y., Huang G.B., Saratchandran P., Sundararajan N. A fast and accurate online sequential learning algorithm for feedforward networks IEEE Transactions on Neural Networks/a Publication of the IEEE Neural Networks Council 17 6 2006 1411 1423
-
(2006)
IEEE Transactions on Neural Networks/a Publication of the IEEE Neural Networks Council
, vol.17
, Issue.6
, pp. 1411-1423
-
-
Liang, N.Y.1
Huang, G.B.2
Saratchandran, P.3
Sundararajan, N.4
-
14
-
-
1842712339
-
A genetic clustering method for intrusion detection
-
Liu Y., Chen K., Liao X., Zhang W. A genetic clustering method for intrusion detection Pattern Recognition 37 2004 927 942
-
(2004)
Pattern Recognition
, vol.37
, pp. 927-942
-
-
Liu, Y.1
Chen, K.2
Liao, X.3
Zhang, W.4
-
15
-
-
0003876171
-
-
Last accessed on February 20
-
Matlab Language of Technical Computing (2012). http://in.mathworks.com/products/matlab/. Last accessed on February 20, 2014.
-
(2012)
Matlab Language of Technical Computing
-
-
-
17
-
-
79961197644
-
What is the analytic hierarchy process?
-
Springer-Verlag Berlin, Heidelberg
-
Saaty T.L. What is the analytic hierarchy process? Mathematical models for decision support NATO ASI series vol. 48 1988 Springer-Verlag Berlin, Heidelberg 109 121
-
(1988)
Mathematical Models for Decision Support NATO ASI Series
, vol.48
, pp. 109-121
-
-
Saaty, T.L.1
-
19
-
-
84892381128
-
TOPSIS based multi-criteria decision making of feature selection techniques for network traffic dataset
-
Singh R., Kumar H., Singla R.K. TOPSIS based multi-criteria decision making of feature selection techniques for network traffic dataset International Journal of Engineering and Technology 5 6 2014 4598 4604
-
(2014)
International Journal of Engineering and Technology
, vol.5
, Issue.6
, pp. 4598-4604
-
-
Singh, R.1
Kumar, H.2
Singla, R.K.3
-
20
-
-
84922013595
-
An on-line sequential learning method in social networks for node classification
-
Sun Y., Yuan Y., Wang G. An on-line sequential learning method in social networks for node classification Neurocomputing 149 2015 207 214
-
(2015)
Neurocomputing
, vol.149
, pp. 207-214
-
-
Sun, Y.1
Yuan, Y.2
Wang, G.3
-
21
-
-
77950575061
-
A detailed analysis of the KDD CUP 99 data set
-
Tavallaee M., Bagheri E., Lu W., Ghorbani A.A. A detailed analysis of the KDD CUP 99 data set IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, (Cisda) 2009 1 6 http://doi.org/10.1109/CISDA.2009.5356528
-
(2009)
IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, (Cisda)
, pp. 1-6
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.A.4
-
22
-
-
58349092287
-
Evolutionary-based feature selection approaches with new criteria for data mining: A case study of credit approval data
-
Wang C.M., Huang Y.F. Evolutionary-based feature selection approaches with new criteria for data mining: A case study of credit approval data Expert Systems with Applications 36 3 2009 5900 5908
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.3
, pp. 5900-5908
-
-
Wang, C.M.1
Huang, Y.F.2
-
23
-
-
84906938183
-
Online sequential extreme learning machine with kernels for nonstationary time series prediction
-
Wang X., Han M. Online sequential extreme learning machine with kernels for nonstationary time series prediction Neurocomputing 145 2014 90 97
-
(2014)
Neurocomputing
, vol.145
, pp. 90-97
-
-
Wang, X.1
Han, M.2
-
24
-
-
11244260106
-
-
Last accessed on January 10
-
Weka 3: Data Mining Software, http://www.cs.waikato.ac.nz/ml/weka/. Last accessed on January 10, 2015.
-
(2015)
Weka 3: Data Mining Software
-
-
-
26
-
-
50649094035
-
Random-Forests based network intrusion detection system
-
Zhang J., Zulkernine M., Haque A. Random-Forests based network intrusion detection system MAN and Cybernetics 38 5 2008 649 659
-
(2008)
MAN and Cybernetics
, vol.38
, Issue.5
, pp. 649-659
-
-
Zhang, J.1
Zulkernine, M.2
Haque, A.3
|