-
1
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
New York, NY, USA
-
M. Abu Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "A multifaceted approach to understanding the botnet phenomenon," in Proc. 6th ACM SIGCOMM Conf. Internet Meas., New York, NY, USA, 2006. pp. 41-52.
-
(2006)
Proc. 6th ACM SIGCOMM Conf. Internet Meas.
, pp. 41-52
-
-
Abu Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
2
-
-
84862323048
-
Classification of botnet detection based on botnet architechture
-
Rajkot, India
-
N. S. Raghava, D. Sahgal, and S. Chandna, "Classification of botnet detection based on botnet architechture," in Proc. Int. Conf. Commun. Syst. Netw. Technol. (CSNT), Rajkot, India, 2012, pp. 569-572.
-
(2012)
Proc. Int. Conf. Commun. Syst. Netw. Technol. (CSNT)
, pp. 569-572
-
-
Raghava, N.S.1
Sahgal, D.2
Chandna, S.3
-
3
-
-
77954549073
-
BotDigger: A fuzzy inference system for botnet detection
-
Barcelona, Spain
-
B. Al-Duwairi and L. Al-Ebbini, "BotDigger: A fuzzy inference system for botnet detection," in Proc. 5th Int. Conf. Internet Monitor. Prot. (ICIMP), Barcelona, Spain, 2010, pp. 16-21.
-
(2010)
Proc. 5th Int. Conf. Internet Monitor. Prot. (ICIMP)
, pp. 16-21
-
-
Al-Duwairi, B.1
Al-Ebbini, L.2
-
4
-
-
0023294428
-
An intrusion-detection model
-
Feb.
-
D. E. Denning, "An intrusion-detection model," IEEE Trans. Softw. Eng., vol. SE-13, no. 2, pp. 222-232, Feb. 1987.
-
(1987)
IEEE Trans. Softw. Eng.
, vol.SE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
5
-
-
84883286084
-
Network intrusion detection using random forests
-
St. Andrews, NB, Canada
-
J. Zhang and M. Zulkernine, "Network intrusion detection using random forests," in Proc. PST, St. Andrews, NB, Canada, 2005, pp. 53-61.
-
(2005)
Proc. PST
, pp. 53-61
-
-
Zhang, J.1
Zulkernine, M.2
-
6
-
-
0003539116
-
Snort-Lightweight intrusion detection for networks
-
Nov.
-
M. Roesch, "Snort-Lightweight intrusion detection for networks," in Proc. USENIX LISA, Nov. 1999.
-
(1999)
Proc. USENIX LISA
-
-
Roesch, M.1
-
7
-
-
34047229997
-
An automatically tuning intrusion detection system
-
Apr.
-
Z. Yu, J. J. P. Tsai, and T. Weigert, "An automatically tuning intrusion detection system," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 37, no. 2, pp. 373-384, Apr. 2007.
-
(2007)
IEEE Trans. Syst., Man, Cybern. B, Cybern
, vol.37
, Issue.2
, pp. 373-384
-
-
Yu, Z.1
Tsai, J.J.P.2
Weigert, T.3
-
8
-
-
84891062279
-
Online adaboostbased parameterized methods for dynamic distributed network intrusion detection
-
Jan.
-
W. Hu, J. Gao, Y. Wang, O. Wu, and S. Maybank, "Online adaboostbased parameterized methods for dynamic distributed network intrusion detection," IEEE Trans. Cybern., vol. 44, no. 1, pp. 66-82, Jan. 2014.
-
(2014)
IEEE Trans. Cybern
, vol.44
, Issue.1
, pp. 66-82
-
-
Hu, W.1
Gao, J.2
Wang, Y.3
Wu, O.4
Maybank, S.5
-
9
-
-
33746809369
-
Min-max hyperellipsoidal clustering for anomaly detection in network security
-
Aug.
-
S. T. Sarasamma and Q. A. Zhu, "Min-max hyperellipsoidal clustering for anomaly detection in network security," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 36, no. 4, pp. 887-901, Aug. 2006.
-
(2006)
IEEE Trans. Syst., Man, Cybern. B, Cybern
, vol.36
, Issue.4
, pp. 887-901
-
-
Sarasamma, S.T.1
Zhu, Q.A.2
-
10
-
-
69249230890
-
Intrusion detection by machine learning: A review
-
C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, and W.-Y. Lin, "Intrusion detection by machine learning: A review," Expert Syst. Appl., vol. 36, no. 10, pp. 11994-12000, 2009.
-
(2009)
Expert Syst. Appl.
, vol.36
, Issue.10
, pp. 11994-12000
-
-
Tsai, C.-F.1
Hsu, Y.-F.2
Lin, C.-Y.3
Lin, W.-Y.4
-
12
-
-
84979214020
-
Adversarial feature selection against evasion attacks
-
to be published
-
F. Zhang, P. P. K. Chan, B. Biggio, D. S. Yeung, and F. Roli, "Adversarial feature selection against evasion attacks," IEEE Trans. Cybern., to be published.
-
IEEE Trans. Cybern
-
-
Zhang, F.1
Chan, P.P.K.2
Biggio, B.3
Yeung, D.S.4
Roli, F.5
-
13
-
-
83755182669
-
C&C tracer: Botnet command and control behavior tracing
-
Anchorage, AK, USA
-
M.-H. Tsai, K.-C. Chang, C.-C. Lin, C.-H. Mao, and H.-M. Lee, "C&C tracer: Botnet command and control behavior tracing," in Proc. IEEE Int. Conf. Syst., Man, Cybern. (SMC), Anchorage, AK, USA, 2011, pp. 1859-1864.
-
(2011)
Proc. IEEE Int. Conf. Syst., Man, Cybern. (SMC)
, pp. 1859-1864
-
-
Tsai, M.-H.1
Chang, K.-C.2
Lin, C.-C.3
Mao, C.-H.4
Lee, H.-M.5
-
14
-
-
84888288736
-
Botnet detection based on traffic behavior analysis and flow intervals
-
Nov.
-
D. Zhao et al., "Botnet detection based on traffic behavior analysis and flow intervals," Comput. Security, vol. 39, pp. 2-16, Nov. 2013.
-
(2013)
Comput. Security
, vol.39
, pp. 2-16
-
-
Zhao, D.1
-
15
-
-
70449466618
-
A survey of botnet and botnet detection
-
Athens, Greece
-
M. Feily, A. Shahrestani, and S. Ramadass, "A survey of botnet and botnet detection," in Proc. 3rd Int. Conf. Emerg. Security Inf., Syst. Technol., SECURWARE, Athens, Greece, 2009, pp. 268-273.
-
(2009)
Proc. 3rd Int. Conf. Emerg. Security Inf., Syst. Technol., SECURWARE
, pp. 268-273
-
-
Feily, M.1
Shahrestani, A.2
Ramadass, S.3
-
16
-
-
85061529860
-
BotHunter: Detecting malware infection through IDS-driven dialog correlation
-
Boston, MA, USA
-
G. Gu, P. A. Porras, V. Yegneswaran, M. W. Fong, and W. Lee, "BotHunter: Detecting malware infection through IDS-driven dialog correlation," in Proc. USENIX Security, Boston, MA, USA, 2007, pp. 167-182.
-
(2007)
Proc. USENIX Security
, pp. 167-182
-
-
Gu, G.1
Porras, P.A.2
Yegneswaran, V.3
Fong, M.W.4
Lee, W.5
-
17
-
-
85093872656
-
Wide-scale botnet detection and characterization
-
Cambridge, MA, USA
-
A. Karasaridis, B. Rexroad, and D. Hoeflin, "Wide-scale botnet detection and characterization," in Proc. 1st Conf. First Workshop Hot Topics Und. Botnets, Cambridge, MA, USA, 2007, p. 7.
-
(2007)
Proc. 1st Conf. First Workshop Hot Topics Und. Botnets
, pp. 7
-
-
Karasaridis, A.1
Rexroad, B.2
Hoeflin, D.3
-
19
-
-
84858767570
-
An anomalybased botnet detection approach for identifying stealthy botnets
-
Penang, Malaysia
-
S. Arshad, M. Abbaspour, M. Kharrazi, and H. Sanatkar, "An anomalybased botnet detection approach for identifying stealthy botnets," in Proc. IEEE Int. Conf. Comput. Appl. Ind. Electron. (ICCAIE), Penang, Malaysia, 2011, pp. 564-569.
-
(2011)
Proc. IEEE Int. Conf. Comput. Appl. Ind. Electron. (ICCAIE)
, pp. 564-569
-
-
Arshad, S.1
Abbaspour, M.2
Kharrazi, M.3
Sanatkar, H.4
-
20
-
-
84893294290
-
Defence against botnets: A formal definition and a general framework
-
Xi'an, China
-
L. Cao and X. Qiu, "Defence against botnets: A formal definition and a general framework," in Proc. IEEE 8th Int. Conf. Netw., Archit. Stor. (NAS), Xi'an, China, 2013, pp. 237-241.
-
(2013)
Proc. IEEE 8th Int. Conf. Netw., Archit. Stor. (NAS)
, pp. 237-241
-
-
Cao, L.1
Qiu, X.2
-
21
-
-
51949100998
-
Identifying botnets using anomaly detection techniques applied to DNS traffic
-
Las Vegas, NV, USA
-
R. Villamarin-Salomon and J. C. Brustoloni, "Identifying botnets using anomaly detection techniques applied to DNS traffic," in Proc. IEEE 5th Consum. Commun. Netw. Conf. CCNC, Las Vegas, NV, USA, 2008, pp. 476-481.
-
(2008)
Proc. IEEE 5th Consum. Commun. Netw. Conf. CCNC
, pp. 476-481
-
-
Villamarin-Salomon, R.1
Brustoloni, J.C.2
-
22
-
-
38049035805
-
Botnet detection by monitoring group activities in DNS traffic
-
Aizuwakamatsu, Japan
-
H. Choi, H. Lee, H. Lee, and H. Kim, "Botnet detection by monitoring group activities in DNS traffic," in Proc. 7th IEEE Int. Conf. Comput. Inf. Technol., CIT, Aizuwakamatsu, Japan, 2007, pp. 715-720.
-
(2007)
Proc. 7th IEEE Int. Conf. Comput. Inf. Technol., CIT
, pp. 715-720
-
-
Choi, H.1
Lee, H.2
Lee, H.3
Kim, H.4
-
23
-
-
33744529638
-
Evolutionary neural networks for anomaly detection based on the behavior of a program
-
Jun.
-
S.-J. Han and S.-B. Cho, "Evolutionary neural networks for anomaly detection based on the behavior of a program," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 36, no. 3, pp. 559-570, Jun. 2005.
-
(2005)
IEEE Trans. Syst., Man, Cybern. B, Cybern
, vol.36
, Issue.3
, pp. 559-570
-
-
Han, S.-J.1
Cho, S.-B.2
-
24
-
-
84882753373
-
Botnet detection based on network behavior
-
Medford, MA, USA: Springer
-
W. T. Strayer, D. Lapsely, R. Walsh, and C. Livadas, "Botnet detection based on network behavior," in Botnet Detection. Medford, MA, USA: Springer, 2008, pp. 1-24.
-
(2008)
Botnet Detection
, pp. 1-24
-
-
Strayer, W.T.1
Lapsely, D.2
Walsh, R.3
Livadas, C.4
-
25
-
-
63749106613
-
Flow-based identification of botnet traffic by mining multiple log files
-
Penang, Malaysia
-
M. M. Masud, T. Al-Khateeb, L. Khan, B. Thuraisingham, and K. W. Hamlen, "Flow-based identification of botnet traffic by mining multiple log files," in Proc. 1st Int. Conf. Distrib. Framework Appl., DFmA, Penang, Malaysia, 2008, pp. 200-206.
-
(2008)
Proc. 1st Int. Conf. Distrib. Framework Appl., DFmA
, pp. 200-206
-
-
Masud, M.M.1
Al-Khateeb, T.2
Khan, L.3
Thuraisingham, B.4
Hamlen, K.W.5
-
26
-
-
80052095850
-
Detecting P2P botnets through network behavior analysis and machine learning
-
Montreal, QC, Canada
-
S. Saad et al., "Detecting P2P botnets through network behavior analysis and machine learning," in Proc. 9th Annu. Int. Conf. Privacy, Security Trust (PST), Montreal, QC, Canada, 2011, pp. 174-180.
-
(2011)
Proc. 9th Annu. Int. Conf. Privacy, Security Trust (PST)
, pp. 174-180
-
-
Saad, S.1
-
27
-
-
84899126375
-
A framework for periodic outlier pattern detection in time-series sequences
-
May
-
F. Rasheed and R. Alhajj, "A framework for periodic outlier pattern detection in time-series sequences," IEEE Trans. Cybern., vol. 44, no. 5, pp. 569-582, May 2014.
-
(2014)
IEEE Trans. Cybern
, vol.44
, Issue.5
, pp. 569-582
-
-
Rasheed, F.1
Alhajj, R.2
-
28
-
-
84872102390
-
Disclosure: Detecting botnet command and control servers through large-scale netflow analysis
-
Orlando, FL, USA
-
L. Bilge, D. Balzarotti, W. Robertson, E. Kirda, and C. Kruegel, "Disclosure: Detecting botnet command and control servers through large-scale netflow analysis," in Proc. 28th Annu. Comput. Security Appl. Conf., Orlando, FL, USA, 2012, pp. 129-138.
-
(2012)
Proc. 28th Annu. Comput. Security Appl. Conf.
, pp. 129-138
-
-
Bilge, L.1
Balzarotti, D.2
Robertson, W.3
Kirda, E.4
Kruegel, C.5
-
29
-
-
84899529303
-
An efficient flow-based botnet detection using supervised machine learning
-
Honolulu, HI, USA
-
M. Stevanovic and J. M. Pedersen, "An efficient flow-based botnet detection using supervised machine learning," in Proc. Int. Conf. Comput., Netw. Commun. (ICNC), Honolulu, HI, USA, 2014, pp. 797-801.
-
(2014)
Proc. Int. Conf. Comput., Netw. Commun. (ICNC)
, pp. 797-801
-
-
Stevanovic, M.1
Pedersen, J.M.2
-
30
-
-
77957764541
-
Packet sampling for worm and botnet detection in TCP connections
-
Osaka, Japan
-
L. Braun, G. Munz, and G. Carle, "Packet sampling for worm and botnet detection in TCP connections," in Proc. IEEE Netw. Oper. Manage. Symp. (NOMS), Osaka, Japan, 2010, pp. 264-271.
-
(2010)
Proc. IEEE Netw. Oper. Manage. Symp. (NOMS)
, pp. 264-271
-
-
Braun, L.1
Munz, G.2
Carle, G.3
-
31
-
-
84979206966
-
-
(Jan.). [Online]
-
(Jan. 2015). French Chapter of Honenynet. [Online]. Available: http://www.honeynet.org/chapters/france
-
(2015)
French Chapter of Honenynet
-
-
-
32
-
-
43949108876
-
On the validation of traffic classification algorithms
-
Berlin, Germany: Springer
-
G. Szabó, D. Orincsay, S. Malomsoky, and I. Szabó, "On the validation of traffic classification algorithms," in Passive and Active Network Measurement. Berlin, Germany: Springer, 2008, pp. 72-81.
-
(2008)
Passive and Active Network Measurement
, pp. 72-81
-
-
Szabó, G.1
Orincsay, D.2
Malomsoky, S.3
Szabó, I.4
-
33
-
-
77955469676
-
An overview of IP flow-based intrusion detection
-
Jul.
-
A. Sperotto et al., "An overview of IP flow-based intrusion detection," IEEE Commun. Surveys Tuts., vol. 12, no. 3, pp. 343-356, Jul. 2010.
-
(2010)
IEEE Commun. Surveys Tuts.
, vol.12
, Issue.3
, pp. 343-356
-
-
Sperotto, A.1
-
34
-
-
84890840695
-
Entelecheia: Detecting P2P botnets in their waiting stage
-
Brooklyn, NY, USA
-
H. Hang, X. Wei, M. Faloutsos, and T. Eliassi-Rad, "Entelecheia: Detecting P2P botnets in their waiting stage," in Proc. IFIP Netw. Conf., Brooklyn, NY, USA, 2013, pp. 1-9.
-
(2013)
Proc. IFIP Netw. Conf.
, pp. 1-9
-
-
Hang, H.1
Wei, X.2
Faloutsos, M.3
Eliassi-Rad, T.4
-
35
-
-
33745561205
-
An introduction to variable and feature selection
-
Mar.
-
I. Guyon and A. Elisseeff, "An introduction to variable and feature selection," J. Mach. Learn. Res., vol. 3, pp. 1157-1182, Mar. 2003.
-
(2003)
J. Mach. Learn. Res.
, vol.3
, pp. 1157-1182
-
-
Guyon, I.1
Elisseeff, A.2
-
36
-
-
84874194408
-
A review of feature selection methods on synthetic data
-
V. Bolón-Canedo, N. Sánchez-Maroño, and A. Alonso-Betanzos, "A review of feature selection methods on synthetic data," Knowl. Inf. Syst., vol. 34, no. 3, pp. 483-519, 2013.
-
(2013)
Knowl. Inf. Syst.
, vol.34
, Issue.3
, pp. 483-519
-
-
Bolón-Canedo, V.1
Sánchez-Maroño, N.2
Alonso-Betanzos, A.3
-
37
-
-
84894646147
-
Network anomaly detection: Methods, systems and tools
-
Feb.
-
M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, "Network anomaly detection: Methods, systems and tools," IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 303-336. Feb. 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.1
, pp. 303-336
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
38
-
-
63749126820
-
Features selection for intrusion detection systems based on support vector machines
-
Las Vegas, NV, USA
-
S. Zaman and F. Karray, "Features selection for intrusion detection systems based on support vector machines," in Proc. 6th IEEE Consum. Commun. Netw. Conf. (CCNC), Las Vegas, NV, USA, 2009, pp. 1-8.
-
(2009)
Proc. 6th IEEE Consum. Commun. Netw. Conf. (CCNC)
, pp. 1-8
-
-
Zaman, S.1
Karray, F.2
-
39
-
-
0036555992
-
Finding representative patterns with ordered projections
-
J. C. Riquelme, J. S. Aguilar-Ruiz, and M. Toro, "Finding representative patterns with ordered projections," Pattern Recognit., vol. 36, no. 4, pp. 1009-1018, 2003.
-
(2003)
Pattern Recognit.
, vol.36
, Issue.4
, pp. 1009-1018
-
-
Riquelme, J.C.1
Aguilar-Ruiz, J.S.2
Toro, M.3
-
40
-
-
19744376790
-
A divide-and-conquer approach to the pairwise opposite class-nearest neighbor (POC-NN) algorithm
-
T. Raicharoen and C. Lursinsap, "A divide-and-conquer approach to the pairwise opposite class-nearest neighbor (POC-NN) algorithm," Pattern Recognit. Lett., vol. 26, no. 10, pp. 1554-1567, 2005.
-
(2005)
Pattern Recognit. Lett.
, vol.26
, Issue.10
, pp. 1554-1567
-
-
Raicharoen, T.1
Lursinsap, C.2
-
41
-
-
0035575921
-
Nearest prototype classifier designs: An experimental study
-
J. C. Bezdek and L. I. Kuncheva, "Nearest prototype classifier designs: An experimental study," Int. J. Intell. Syst., vol. 16, no. 12, pp. 1445-1473, 2001.
-
(2001)
Int. J. Intell. Syst.
, vol.16
, Issue.12
, pp. 1445-1473
-
-
Bezdek, J.C.1
Kuncheva, L.I.2
-
42
-
-
0036887535
-
An efficient prototype merging strategy for the condensed 1-NN rule through class-conditional hierarchical clustering
-
R. A. Mollineda, F. J. Ferri, and E. Vidal, "An efficient prototype merging strategy for the condensed 1-NN rule through class-conditional hierarchical clustering," Pattern Recognit., vol. 35, no. 12, pp. 2771-2782, 2002.
-
(2002)
Pattern Recognit.
, vol.35
, Issue.12
, pp. 2771-2782
-
-
Mollineda, R.A.1
Ferri, F.J.2
Vidal, E.3
-
43
-
-
25844469288
-
The nearest subclass classifier: A compromise between the nearest mean and nearest neighbor classifier
-
Sep.
-
C. J. Veenman and M. J. T. Reinders, "The nearest subclass classifier: A compromise between the nearest mean and nearest neighbor classifier," IEEE Trans. Pattern Anal. Mach. Intell., vol. 27, no. 9, pp. 1417-1429, Sep. 2005.
-
(2005)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.27
, Issue.9
, pp. 1417-1429
-
-
Veenman, C.J.1
Reinders, M.J.T.2
-
44
-
-
0012590697
-
An evaluation of sampling methods for data mining with fuzzy c-means
-
New York, NY, USA: Springer
-
K. Josien, G. Wang, T. W. Liao, E. Triantaphyllou, and M. C. Liu, "An evaluation of sampling methods for data mining with fuzzy c-means," in Data Mining for Design and Manufacturing. New York, NY, USA: Springer, 2001, pp. 355-369.
-
(2001)
Data Mining for Design and Manufacturing
, pp. 355-369
-
-
Josien, K.1
Wang, G.2
Liao, T.W.3
Triantaphyllou, E.4
Liu, M.C.5
-
46
-
-
84927753089
-
Experimental study of data clustering using k-means and modified algorithms
-
M. P. S. Bhatia and D. Khurana, "Experimental study of data clustering using k-means and modified algorithms," Int. J. Data Mining Knowl. Manage. Process (IJDKP), vol. 3, no. 3, pp. 17-30, 2013.
-
(2013)
Int. J. Data Mining Knowl. Manage. Process (IJDKP)
, vol.3
, Issue.3
, pp. 17-30
-
-
Bhatia, M.P.S.1
Khurana, D.2
-
47
-
-
84875981476
-
A comparative study of reduced error pruning method in decision tree algorithms
-
Penang, Malaysia
-
W. N. H. W. Mohamed, M. N. M. Salleh, and A. H. Omar, "A comparative study of reduced error pruning method in decision tree algorithms," in Proc. IEEE Int. Conf. Control Syst. Comput. Eng. (ICCSCE), Penang, Malaysia, 2012, pp. 392-397.
-
(2012)
Proc. IEEE Int. Conf. Control Syst. Comput. Eng. (ICCSCE)
, pp. 392-397
-
-
Mohamed, W.N.H.W.1
Salleh, M.N.M.2
Omar, A.H.3
-
48
-
-
0001781555
-
Voronoi diagrams
-
Amsterdam, The Netherlands: Elsevier North Holland
-
F. Aurenhammer and R. Klein, "Voronoi diagrams," Handbook of Computational Geometry, vol. 5. Amsterdam, The Netherlands: Elsevier North Holland, 2000, pp. 201-290.
-
(2000)
Handbook of Computational Geometry
, vol.5
, pp. 201-290
-
-
Aurenhammer, F.1
Klein, R.2
-
49
-
-
33744584654
-
Induction of decision trees
-
J. R. Quinlan, "Induction of decision trees," Mach. Learn., vol. 1, no. 1, pp. 81-106, 1986.
-
(1986)
Mach. Learn.
, vol.1
, Issue.1
, pp. 81-106
-
-
Quinlan, J.R.1
-
50
-
-
0030211964
-
Bagging predictors
-
L. Breiman, "Bagging predictors," Mach. Learn., vol. 24, no. 2, pp. 123-140, 1996.
-
(1996)
Mach. Learn.
, vol.24
, Issue.2
, pp. 123-140
-
-
Breiman, L.1
-
51
-
-
0003802343
-
-
Monterey, CA, USA: Wadsworth and Brooks
-
L. Breiman, J. H. Friedman, R. A. Olshen, and C. J. Stone, Classification and Regression Trees. Monterey, CA, USA: Wadsworth and Brooks, 1984.
-
(1984)
Classification and Regression Trees
-
-
Breiman, L.1
Friedman, J.H.2
Olshen, R.A.3
Stone, C.J.4
-
52
-
-
0004060921
-
-
Ph.D. dissertation, Dept. Comput. Sci., Waikato Univ., Hamilton, New Zealand
-
M. A. Hall, "Correlation-based feature selection for machine learning," Ph.D. dissertation, Dept. Comput. Sci., Waikato Univ., Hamilton, New Zealand, 1999.
-
(1999)
Correlation-based Feature Selection for Machine Learning
-
-
Hall, M.A.1
|