-
1
-
-
84872967561
-
Anomaly intrusion detection based on PLS feature extraction and core vector machine
-
X.S. Gan, J.S. Duanmu, J.F. Wang, and W. Cong Anomaly intrusion detection based on PLS feature extraction and core vector machine Knowl. Based Syst. 40 2013 1 6
-
(2013)
Knowl. Based Syst.
, vol.40
, pp. 1-6
-
-
Gan, X.S.1
Duanmu, J.S.2
Wang, J.F.3
Cong, W.4
-
2
-
-
33750514606
-
Modeling intrusion detection system using hybrid intelligent systems
-
S. Peddabachigari, A. Abraham, C. Grosan, and J. Thomas Modeling intrusion detection system using hybrid intelligent systems J. Netw. Comput. Appl. 30 1 2007 114 132
-
(2007)
J. Netw. Comput. Appl.
, vol.30
, Issue.1
, pp. 114-132
-
-
Peddabachigari, S.1
Abraham, A.2
Grosan, C.3
Thomas, J.4
-
4
-
-
84890061675
-
Applying Ant Colony Optimization to configuring stacking ensembles for data mining
-
Y. Chen, M.-L. Wong, and H. Li Applying Ant Colony Optimization to configuring stacking ensembles for data mining Expert Syst. Appl. 41 6 2014 2688 2702
-
(2014)
Expert Syst. Appl.
, vol.41
, Issue.6
, pp. 2688-2702
-
-
Chen, Y.1
Wong, M.-L.2
Li, H.3
-
5
-
-
0004222346
-
-
Morgan Kaufmann Publishers Inc. San Francisco, CA, USA
-
J. Kennedy, and R.C. Eberhart Swarm Intelligence 2001 Morgan Kaufmann Publishers Inc. San Francisco, CA, USA
-
(2001)
Swarm Intelligence
-
-
Kennedy, J.1
Eberhart, R.C.2
-
6
-
-
84864961280
-
Application of bagging, boosting and stacking to intrusion detection
-
Springer
-
I. Syarif, E. Zaluska, A. Prugel-Bennett, and G. Wills Application of bagging, boosting and stacking to intrusion detection Machine Learning and Data Mining in Pattern Recognition 2012 Springer 593 602
-
(2012)
Machine Learning and Data Mining in Pattern Recognition
, pp. 593-602
-
-
Syarif, I.1
Zaluska, E.2
Prugel-Bennett, A.3
Wills, G.4
-
11
-
-
79959816326
-
Optimization of ensemble based decision using PSO
-
A. Kausar, M. Ishtiaq, M.A. Jaffar, and A.M. Mirza Optimization of ensemble based decision using PSO Proceedings of the World Congress on Engineering, WCE, vol. 10 2010
-
(2010)
Proceedings of the World Congress on Engineering, WCE, Vol. 10
-
-
Kausar, A.1
Ishtiaq, M.2
Jaffar, M.A.3
Mirza, A.M.4
-
12
-
-
35148838877
-
The weighted majority algorithm
-
N. Littlestone, and M. Warmuth The weighted majority algorithm Inf. Comput. 108 2 1994 212 261 10.1006/inco.1994.1009 http://www.sciencedirect.com/science/article/pii/S0890540184710091.
-
(1994)
Inf. Comput.
, vol.108
, Issue.2
, pp. 212-261
-
-
Littlestone, N.1
Warmuth, M.2
-
13
-
-
84945948500
-
-
http://kdd.ics.uci.edu/databases/kddcup99
-
-
-
-
14
-
-
84864772502
-
An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection
-
S.-W. Lin, K.-C. Ying, C.-Y. Lee, and Z.-J. Lee An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection Appl. Soft Comput. 12 10 2012 3285 3290
-
(2012)
Appl. Soft Comput.
, vol.12
, Issue.10
, pp. 3285-3290
-
-
Lin, S.-W.1
Ying, K.-C.2
Lee, C.-Y.3
Lee, Z.-J.4
-
15
-
-
77954556689
-
Identifying important characteristics in the KDD99 intrusion detection dataset by feature selection using a hybrid approach
-
IEEE
-
N. Araujo, R. de Oliveira, E.-W. Ferreira, A. Shinoda, and B. Bhargava Identifying important characteristics in the KDD99 intrusion detection dataset by feature selection using a hybrid approach 2010 IEEE 17th International Conference on Telecommunications (ICT) 2010 IEEE 552 558
-
(2010)
2010 IEEE 17th International Conference on Telecommunications (ICT)
, pp. 552-558
-
-
Araujo, N.1
De Oliveira, R.2
Ferreira, E.-W.3
Shinoda, A.4
Bhargava, B.5
-
16
-
-
84894281761
-
A novel hybrid KPCA and SVM with GA model for intrusion detection
-
F. Kuang, W. Xu, and S. Zhang A novel hybrid KPCA and SVM with GA model for intrusion detection Appl. Soft Comput. 18 2014 178 184
-
(2014)
Appl. Soft Comput.
, vol.18
, pp. 178-184
-
-
Kuang, F.1
Xu, W.2
Zhang, S.3
-
17
-
-
77956613687
-
A novel intrusion detection system based on hierarchical clustering and support vector machines
-
S.J. Horng, M.Y. Su, Y.H. Chen, T.W. Kao, R.J. Chen, J.L. Lai, and C.D. Perkasa A novel intrusion detection system based on hierarchical clustering and support vector machines Expert Syst. Appl. 38 1 2011 306 313
-
(2011)
Expert Syst. Appl.
, vol.38
, Issue.1
, pp. 306-313
-
-
Horng, S.J.1
Su, M.Y.2
Chen, Y.H.3
Kao, T.W.4
Chen, R.J.5
Lai, J.L.6
Perkasa, C.D.7
-
18
-
-
71749108310
-
Constructing attribute weights from computer audit data for effective intrusion detection
-
W. Wang, X. Zhang, and S. Gombault Constructing attribute weights from computer audit data for effective intrusion detection J. Syst. Softw. 82 12 2009 1974 1981
-
(2009)
J. Syst. Softw.
, vol.82
, Issue.12
, pp. 1974-1981
-
-
Wang, W.1
Zhang, X.2
Gombault, S.3
|