-
1
-
-
33750954957
-
High-dimensional pattern analysis in multimedia information retrieval and bioinformatics
-
State University, New York, Doctoral Thesis
-
Wu Y. High-dimensional pattern analysis in multimedia information retrieval and bioinformatics. State University, New York, Doctoral Thesis, 2004.
-
(2004)
-
-
Wu, Y.1
-
3
-
-
35248857893
-
An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection
-
Pittsburgh, PA, USA, Springer Verlag, 3-8 September
-
Mahoney M, Chan P. An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection. In Proceeding of Recent Advances in Intrusion Detection (RAID), Pittsburgh, PA, USA, Springer Verlag, 3-8 September 2003; 220-237.
-
(2003)
Proceeding of Recent Advances in Intrusion Detection (RAID)
, pp. 220-237
-
-
Mahoney, M.1
Chan, P.2
-
4
-
-
80051998644
-
-
New Orleans, USAIEEE Congress on Evolutionary Computation, 5-8 June
-
Malik AJ, Shahzad W, Khan FA. Binary PSO and Random Forests Algorithm for PROBE Attacks Detection in a Network, New Orleans, USAIEEE Congress on Evolutionary Computation, 5-8 June 2011; 662-668.
-
(2011)
Binary PSO and Random Forests Algorithm for PROBE Attacks Detection in a Network
, pp. 662-668
-
-
Malik, A.J.1
Shahzad, W.2
Khan, F.A.3
-
6
-
-
0003451777
-
A real-time intrusion detection expert system (IDES)
-
Technical Report Project 6784, Computer Science Laboratory, SRI International
-
Lunt TF, Tamaru A, Gilham F, Jagannathan R, Jalali C, Neuman PG. A real-time intrusion detection expert system (IDES). Technical Report Project 6784, Computer Science Laboratory, SRI International, 1992.
-
(1992)
-
-
Lunt, T.F.1
Tamaru, A.2
Gilham, F.3
Jagannathan, R.4
Jalali, C.5
Neuman, P.G.6
-
7
-
-
0037282635
-
Efficient anomaly detection by modeling privilege flows with hidden Markov model
-
Cho S-B, Park H-J. Efficient anomaly detection by modeling privilege flows with hidden Markov model. Computers and Security 2003; 22(1): 45-55.
-
(2003)
Computers and Security
, vol.22
, Issue.1
, pp. 45-55
-
-
Cho, S.-B.1
Park, H.-J.2
-
8
-
-
0034300835
-
Improving intrusion detection performance using keyword selection and neural networks
-
Lippmann R, Cunningham S. Improving intrusion detection performance using keyword selection and neural networks. Computer Networks 2000; 34(4):594-603.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 594-603
-
-
Lippmann, R.1
Cunningham, S.2
-
9
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
San Francisco, CA May -
-
Lazarevic A, Ertoz L, Kumar V, Ozgur A, Srivastava J. A comparative study of anomaly detection schemes in network intrusion detection. In Proceedings of Third SIAM Conference on Data Mining, San Francisco, CA May 1-3, 2003.
-
(2003)
Proceedings of Third SIAM Conference on Data Mining
, pp. 1-3
-
-
Lazarevic, A.1
Ertoz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
10
-
-
0242667960
-
Detecting unusual program behavior using the statistical components of NIDES
-
NIDES Technical Report, SRI International
-
Anderson D, Lunt TF, Tamaru HS, Javits A, Valdes A. Detecting unusual program behavior using the statistical components of NIDES. NIDES Technical Report, SRI International, 1995.
-
(1995)
-
-
Anderson, D.1
Lunt, T.F.2
Tamaru, H.S.3
Javits, A.4
Valdes, A.5
-
11
-
-
0026850007
-
A neural network component for an intrusion detection system
-
Oakland, CA
-
Debar H, Becker M, Siboni D. A neural network component for an intrusion detection system. In Proceedings of 1992 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, 1992; 240-250.
-
(1992)
Proceedings of 1992 IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 240-250
-
-
Debar, H.1
Becker, M.2
Siboni, D.3
-
12
-
-
24044475779
-
Intrusion detection using ensemble of soft computing paradigms
-
Springer-Verlag: Germany
-
Mukkamala S, Sung AH, Abrham A. Intrusion detection using ensemble of soft computing paradigms. In Third International Conference on Intelligent Systems Design and Applications, Intelligent Systems Design and Applications, Advances in Soft Computing. Springer-Verlag: Germany, 2003; 239-248.
-
(2003)
Third International Conference on Intelligent Systems Design and Applications, Intelligent Systems Design and Applications, Advances in Soft Computing
, pp. 239-248
-
-
Mukkamala, S.1
Sung, A.H.2
Abrham, A.3
-
13
-
-
0242637092
-
Detecting intrusion with rule based integration of multiple models
-
Han S-J, Cho S-B. Detecting intrusion with rule based integration of multiple models. Computers and Security 2003; 22(7): 613-623.
-
(2003)
Computers and Security
, vol.22
, Issue.7
, pp. 613-623
-
-
Han, S.-J.1
Cho, S.-B.2
-
14
-
-
0003479517
-
-
Morgan Kaufmann Publishers, Inc
-
Banzhaf W, Nordin P, Keller ER, Francone FD. Genetic Programming: An Introduction on the Automatic Evolution of Compute Programs and its Applications. Morgan Kaufmann Publishers, Inc, 1998.
-
(1998)
Genetic Programming: An Introduction on the Automatic Evolution of Compute Programs and its Applications
-
-
Banzhaf, W.1
Nordin, P.2
Keller, E.R.3
Francone, F.D.4
-
15
-
-
84902156141
-
Neuro-fuzzy systems: state-of-the-art modeling techniques, connectionist models of neurons, learning processes, and artificial intelligence
-
Mira J, Prieto A (eds). Springer-Verlag: Germany, Granada, Spain.
-
Abraham A. Neuro-fuzzy systems: state-of-the-art modeling techniques, connectionist models of neurons, learning processes, and artificial intelligence. In Lecture Notes in Computer Science, Vol. 2084, Mira J, Prieto A (eds). Springer-Verlag: Germany, 2001; 269-276. Granada, Spain.
-
(2001)
Lecture Notes in Computer Science
, vol.2084
, pp. 269-276
-
-
Abraham, A.1
-
16
-
-
50649094035
-
Random-forests-based network intrusion detection systems
-
Zhang J, Zulkernine M, Haque A. Random-forests-based network intrusion detection systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 2008; 38(5): 649-659.
-
(2008)
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
, vol.38
, Issue.5
, pp. 649-659
-
-
Zhang, J.1
Zulkernine, M.2
Haque, A.3
-
18
-
-
79960464355
-
An effective intrusion detection model based on random forest and neural networks
-
Zhong SH, Huang HJ, Chen AB. An effective intrusion detection model based on random forest and neural networks. Advanced Materials Research 2011; 267(308): 308-313.
-
(2011)
Advanced Materials Research
, vol.267
, Issue.308
, pp. 308-313
-
-
Zhong, S.H.1
Huang, H.J.2
Chen, A.B.3
-
19
-
-
33745498517
-
Applications of fuzzy data mining methods for intrusion detection systems
-
Lagana A (ed.). Assisi Italy, LNCS 3045
-
Guan J, Da-xin Liu, Wang T. Applications of fuzzy data mining methods for intrusion detection systems. In ICOIN 2004, Lagana A et al. (ed.). Assisi Italy, LNCS 3045, 2004; 706-714.
-
(2004)
ICOIN 2004
, pp. 706-714
-
-
Guan, J.1
Da-xin, L.2
Wang, T.3
-
20
-
-
34548613852
-
Network intrusion detection using wavelet analysis
-
New york, Das G, Gulati VP (eds). Springer Verlag: Berlin Heidelberg
-
Rawat S, Sastry CS. Network intrusion detection using wavelet analysis. In CIT, LNCS 3356, New york, Das G, Gulati VP (eds). Springer Verlag: Berlin Heidelberg, 2004; 224-232.
-
(2004)
CIT, LNCS 3356
, pp. 224-232
-
-
Rawat, S.1
Sastry, C.S.2
-
21
-
-
34247226566
-
Immune systems, danger theory and intrusion detection
-
ICSRIM University of Leeds, The Society for the Study of Artificial Intelligence and the simulation of behaviour, U.K., 29 March- 1 April
-
Twycross J. Immune systems, danger theory and intrusion detection. In Proceedings of the AISB 2004 Symposium on Immune System and Cognition, ICSRIM University of Leeds, The Society for the Study of Artificial Intelligence and the simulation of behaviour, U.K., 29 March- 1 April 2004; 40-42.
-
(2004)
Proceedings of the AISB 2004 Symposium on Immune System and Cognition
, pp. 40-42
-
-
Twycross, J.1
-
22
-
-
26944501944
-
Intelligent Bayesian classifiers in network intrusion detection
-
Bari, LANI 3533. Springer: Italy, June 22-24
-
Bosin A, Dessi N, Pes B. Intelligent Bayesian classifiers in network intrusion detection. In Lecture Notecs in Computer Science, IEA/AIE 2005, Bari, LANI 3533. Springer: Italy, June 22-24, 2005; 445-447.
-
(2005)
Lecture Notecs in Computer Science, IEA/AIE 2005
, pp. 445-447
-
-
Bosin, A.1
Dessi, N.2
Pes, B.3
-
23
-
-
33645961388
-
-
Lecture Notes in Computer Science, Springer-Verlag: Berlin
-
Alves RT, Delgado MRBS, Lopes HS, Freitas AA. An Artificial Immune System for Fuzzy-rule Induction in Data Mining. Lecture Notes in Computer Science, Vol. 3242, Springer-Verlag: Berlin, 2004; 1011-1020.
-
(2004)
An Artificial Immune System for Fuzzy-rule Induction in Data Mining
, vol.3242
, pp. 1011-1020
-
-
Alves, R.T.1
Delgado, M.R.B.S.2
Lopes, H.S.3
Freitas, A.A.4
-
24
-
-
34247203682
-
Combination artificial ant clustering and K-PSO clustering approach to network security model
-
Jeju Island, Korea, Springer Verlag, 9-11 November
-
Srinoy S, Kurutach W. Combination artificial ant clustering and K-PSO clustering approach to network security model. In IEEE International Conference on Hybrid Information Technology, Jeju Island, Korea, Springer Verlag, 9-11 November 2006; 128-134.
-
(2006)
IEEE International Conference on Hybrid Information Technology
, pp. 128-134
-
-
Srinoy, S.1
Kurutach, W.2
-
25
-
-
79951822194
-
Chaotic binary particle swarm optimization for feature selection using logistic map
-
Hong Kong, IAENG, 19-21 March
-
Chuang L, Li J-C, Yang C-H. Chaotic binary particle swarm optimization for feature selection using logistic map. In Proceedings of the International MultiConference of Engineers and Computer Scientists, Hong Kong, IAENG, 19-21 March 2008; 131-136.
-
(2008)
Proceedings of the International MultiConference of Engineers and Computer Scientists
, pp. 131-136
-
-
Chuang, L.1
Li, J.-C.2
Yang, C.-H.3
-
26
-
-
33750955638
-
A hybrid network intrusion detection technique using random forests
-
Vienna University of Technology, Austria, IEEE Computer Society, 20-22 April
-
Zhang J, Zulkernine M. A hybrid network intrusion detection technique using random forests. In Proceedings of the First International Conference on Availability, Reliability and Security, Vienna University of Technology, Austria, IEEE Computer Society, 20-22 April 2006; 262-269.
-
(2006)
Proceedings of the First International Conference on Availability, Reliability and Security
, pp. 262-269
-
-
Zhang, J.1
Zulkernine, M.2
-
27
-
-
68149099646
-
Modeling network intrusion detection system using feature selection and parameters optimization
-
Kim DS, Park JS. Modeling network intrusion detection system using feature selection and parameters optimization. IEICE Transactions on Information and Systems 2008; E91-D: 1050-1057.
-
(2008)
IEICE Transactions on Information and Systems
, vol.E91D
, pp. 1050-1057
-
-
Kim, D.S.1
Park, J.S.2
-
28
-
-
70349509437
-
A feature selection approach for network intrusion detection
-
Kuala Lumpur Malaysia, IEEE Computer Society, 3-5 April
-
Khor K-C, Ting C-Y, Amnuaisuk S-P. A feature selection approach for network intrusion detection. In ICIME International Conference on Information Management and Engineering, Kuala Lumpur Malaysia, IEEE Computer Society, 3-5 April 2009; 133-137.
-
(2009)
ICIME International Conference on Information Management and Engineering
, pp. 133-137
-
-
Khor, K.-C.1
Ting, C.-Y.2
Amnuaisuk, S.-P.3
-
29
-
-
72449131513
-
From feature selection to building of Bayesian classifiers: a network intrusion detection perspective
-
Khor K-C, Ting C-Y, Amnuaisuk S-P. From feature selection to building of Bayesian classifiers: a network intrusion detection perspective. American Journal of Applied Sciences 2009; 6: 1949-1960.
-
(2009)
American Journal of Applied Sciences
, vol.6
, pp. 1949-1960
-
-
Khor, K.-C.1
Ting, C.-Y.2
Amnuaisuk, S.-P.3
-
33
-
-
24944552355
-
Feature selection and intrusion detection using hybrid flexible neural tree
-
Springer-Verlag: Berlin Heidelberg
-
Chen Y, Abraham A, Yang J. Feature selection and intrusion detection using hybrid flexible neural tree. In Lecture Notes in Computer Science 3498. Springer-Verlag: Berlin Heidelberg, 2005; 439-444.
-
(2005)
Lecture Notes in Computer Science 3498
, pp. 439-444
-
-
Chen, Y.1
Abraham, A.2
Yang, J.3
-
35
-
-
58149263390
-
A PSO-based approach to rule learning in network intrusion detection
-
Springer: Berlin/Heidelberg
-
Chen G, Chen Q, Guo W. A PSO-based approach to rule learning in network intrusion detection. In Fuzzy Information and Engineering, Advances in Soft Computing, Vol. 40. Springer: Berlin/Heidelberg, 2007; 666-673.
-
(2007)
Fuzzy Information and Engineering, Advances in Soft Computing
, vol.40
, pp. 666-673
-
-
Chen, G.1
Chen, Q.2
Guo, W.3
-
36
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: a review
-
Xiaonan S, Banzhaf W. The use of computational intelligence in intrusion detection systems: a review. Applied Soft Computing 2010; 10:1-35.
-
(2010)
Applied Soft Computing
, vol.10
, pp. 1-35
-
-
Xiaonan, S.1
Banzhaf, W.2
-
37
-
-
84944100714
-
-
The UCI KDD Archive KDD'99 datasets. Irvine, CA, USA
-
The UCI KDD Archive KDD'99 datasets. Irvine, CA, USA, 1999. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
-
(1999)
-
-
-
38
-
-
84944100715
-
-
PSO overview.
-
PSO overview. http://www.swarmintelligence.org/
-
-
-
-
40
-
-
0035478854
-
Random Forests
-
Kluwer Academic Publishers: Netherlands
-
Breiman L. Random Forests. In Machine Learning, Vol. 45. Kluwer Academic Publishers: Netherlands, 2001; 5-32.
-
(2001)
Machine Learning
, vol.45
, pp. 5-32
-
-
Breiman, L.1
-
41
-
-
84944100716
-
-
Random Forests.
-
Random Forests. http://www.stat.berkeley.edu/~breiman/RandomForests/cc_home.htm
-
-
-
-
43
-
-
10444280144
-
An extensive comparison of recent classification tools applied to microarray data
-
Lee J, Park M, Song S. An extensive comparison of recent classification tools applied to microarray data. Computational Statistics & Data Analysis 2005; 48: 869-885.
-
(2005)
Computational Statistics & Data Analysis
, vol.48
, pp. 869-885
-
-
Lee, J.1
Park, M.2
Song, S.3
-
44
-
-
30644464444
-
Gene selection and classification of microarray data using random forests
-
Uriarte RD, Andres SA. Gene selection and classification of microarray data using random forests. BMC Bioinformatics 2006; 7:3.
-
(2006)
BMC Bioinformatics
, vol.7
, pp. 3
-
-
Uriarte, R.D.1
Andres, S.A.2
-
45
-
-
2942513120
-
Application of the random forest classification algorithm to a SELDI-TOF proteomics study in the setting of a cancer prevention trial
-
Izmirlian G. Application of the random forest classification algorithm to a SELDI-TOF proteomics study in the setting of a cancer prevention trial. Annals of the New York Academy of Sciences 2004; 1020: 154-174.
-
(2004)
Annals of the New York Academy of Sciences
, vol.1020
, pp. 154-174
-
-
Izmirlian, G.1
|