-
4
-
-
84864053997
-
Brain tissue mr-image segmentation via optimum-path forest clustering
-
F.A.M. Cappabianco, A.X. Falcão, C.L. Yasuda, and J.K. Udupa Brain tissue mr-image segmentation via optimum-path forest clustering Comput. Vis. Image Und. 116 10 2012 1047 1059
-
(2012)
Comput. Vis. Image Und.
, vol.116
, Issue.10
, pp. 1047-1059
-
-
Cappabianco, F.A.M.1
Falcão, A.X.2
Yasuda, C.L.3
Udupa, J.K.4
-
5
-
-
79961227926
-
Identification and prediction of internet traffic using artificial neural networks
-
S. Chabaa, A. Zeroual, and J. Antari Identification and prediction of internet traffic using artificial neural networks J. Intell. Learn. Syst. Appl. 2 3 2010 147 155
-
(2010)
J. Intell. Learn. Syst. Appl.
, vol.2
, Issue.3
, pp. 147-155
-
-
Chabaa, S.1
Zeroual, A.2
Antari, J.3
-
7
-
-
13544269338
-
Application of SVM and ANN for intrusion detection
-
W.-H. Chen, S.-H. Hsu, and H.-P. Shen Application of SVM and ANN for intrusion detection Comput. Oper. Res. 32 10 2005 2617 2634
-
(2005)
Comput. Oper. Res.
, vol.32
, Issue.10
, pp. 2617-2634
-
-
Chen, W.-H.1
Hsu, S.-H.2
Shen, H.-P.3
-
8
-
-
0037331011
-
An algorithm for data-driven bandwidth selection
-
D. Comaniciu An algorithm for data-driven bandwidth selection IEEE Trans. Pattern Anal. Mach. Intell. 25 2 2003 281 288
-
(2003)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.25
, Issue.2
, pp. 281-288
-
-
Comaniciu, D.1
-
9
-
-
84876939080
-
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues
-
Igino Corona, Giorgio Giacinto, and Fabio Roli Adversarial attacks against intrusion detection systems: taxonomy, solutions and open issues Inf. Sci. 239 0 2013 201 225
-
(2013)
Inf. Sci.
, vol.239
, Issue.0
, pp. 201-225
-
-
Corona, I.1
Giacinto, G.2
Roli, F.3
-
10
-
-
0009900351
-
Anomaly detection over noisy data using learned probability distributions
-
Morgan Kaufmann
-
Eleazar Eskin Anomaly detection over noisy data using learned probability distributions Proceedings of the International Conference on Machine Learning 2000 Morgan Kaufmann 255 262
-
(2000)
Proceedings of the International Conference on Machine Learning
, pp. 255-262
-
-
Eskin, E.1
-
11
-
-
0742303474
-
The image foresting transform theory, algorithms, and applications
-
A.X. Falcão, J. Stolfi, and R.A. Lotufo The image foresting transform theory, algorithms, and applications IEEE Trans. Pattern Anal. Mach. Intell. 26 1 2004 19 29
-
(2004)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.26
, Issue.1
, pp. 19-29
-
-
Falcão, A.X.1
Stolfi, J.2
Lotufo, R.A.3
-
12
-
-
84889888048
-
A comprehensive review of firefly algorithms
-
Iztok Fister, Iztok Fister Jr., Xin-She Yang, and Janez Brest A comprehensive review of firefly algorithms Swarm Evol. Comput. 13 0 2013 34 46
-
(2013)
Swarm Evol. Comput.
, vol.13
, Issue.0
, pp. 34-46
-
-
Fister, I.1
Fister, Jr.I.2
Yang, X.-S.3
Brest, J.4
-
14
-
-
85019678573
-
Detecting anomalous and unknown intrusions against programs
-
A.K. Ghosh, J. Wanken, F. Charron, Detecting anomalous and unknown intrusions against programs, in: Proceedings of the Annual Computer Security Application Conference, 1998, pp. 259-267.
-
(1998)
Proceedings of the Annual Computer Security Application Conference
, pp. 259-267
-
-
Ghosh, A.K.1
Wanken, J.2
Charron, F.3
-
16
-
-
50249084525
-
Ad hoc-based feature selection and support vector machine classifier for intrusion detection
-
X. Haijun, P. Fang, W. Ling, L. Hongwei, Ad hoc-based feature selection and support vector machine classifier for intrusion detection, in: Proceedings of 2007 IEEE International Conference on Grey Systems and Intelligent Services, 2007, pp. 18-20.
-
(2007)
Proceedings of 2007 IEEE International Conference on Grey Systems and Intelligent Services
, pp. 18-20
-
-
Haijun, X.1
Fang, P.2
Ling, W.3
Hongwei, L.4
-
19
-
-
84966588483
-
Intrusion detection based on the immune human system
-
IEEE Computer Society Washington, DC, USA
-
K.R.L. Jucá, A. Boukerche, and J.B.M. Sobral Intrusion detection based on the immune human system Proceedings of the 16th International Parallel and Distributed Processing Symposium 2002 IEEE Computer Society Washington, DC, USA 187
-
(2002)
Proceedings of the 16th International Parallel and Distributed Processing Symposium
, pp. 187
-
-
Jucá, K.R.L.1
Boukerche, A.2
Sobral, J.B.M.3
-
23
-
-
84888315965
-
A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
-
Gisung Kim, Seungmin Lee, and Sehun Kim A novel hybrid intrusion detection method integrating anomaly detection with misuse detection Expert Syst. Appl. 41 4, Part 2 2014 1690 1700
-
(2014)
Expert Syst. Appl.
, vol.41
, Issue.4 PART 2
, pp. 1690-1700
-
-
Kim, G.1
Lee, S.2
Kim, S.3
-
26
-
-
84870713037
-
Intrusion detection system: A comprehensive review
-
Hung-Jen Liao, Chun-Hung Richard Lin, Ying-Chih Lin, and Kuang-Yuan Tung Intrusion detection system: a comprehensive review J. Network Comput. Appl. 36 1 2013 16 24
-
(2013)
J. Network Comput. Appl.
, vol.36
, Issue.1
, pp. 16-24
-
-
Liao, H.-J.1
Lin, C.-H.R.2
Lin, Y.-C.3
Tung, K.-Y.4
-
27
-
-
0347245458
-
Effective time variation of g in a model universe with variable space dimension
-
Reza Mansouri, Forough Nasseri, and Mohammad Khorrami Effective time variation of g in a model universe with variable space dimension Phys. Lett. A 259 34 1999 194 200
-
(1999)
Phys. Lett. A
, vol.259
, Issue.34
, pp. 194-200
-
-
Mansouri, R.1
Nasseri, F.2
Khorrami, M.3
-
28
-
-
84870696413
-
A survey of intrusion detection techniques in cloud
-
Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, and Muttukrishnan Rajarajan A survey of intrusion detection techniques in cloud J. Network Comput. Appl. 36 1 2013 42 57
-
(2013)
J. Network Comput. Appl.
, vol.36
, Issue.1
, pp. 42-57
-
-
Modi, C.1
Patel, D.2
Borisaniya, B.3
Patel, H.4
Patel, A.5
Rajarajan, M.6
-
29
-
-
80052699760
-
Efficient supervised optimum-path forest classification for large datasets
-
J.P. Papa, A.X. Falcão, V.H.C. Albuquerque, and J.M.R.S. Tavares Efficient supervised optimum-path forest classification for large datasets Pattern Recogn. 45 1 2012 512 520
-
(2012)
Pattern Recogn.
, vol.45
, Issue.1
, pp. 512-520
-
-
Papa, J.P.1
Falcão, A.X.2
Albuquerque, V.H.C.3
Tavares, J.M.R.S.4
-
32
-
-
84870667876
-
An intrusion detection and prevention system in cloud computing: A systematic review
-
Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari, and Joaquim Celestino Júnior An intrusion detection and prevention system in cloud computing: a systematic review J. Network Comput. Appl. 36 1 2013 25 41
-
(2013)
J. Network Comput. Appl.
, vol.36
, Issue.1
, pp. 25-41
-
-
Patel, A.1
Taghavi, M.2
Bakhtiyari, K.3
Júnior, J.C.4
-
33
-
-
84864563699
-
An optimum-path forest framework for intrusion detection in computer networks
-
C.R. Pereira, R.Y.M. Nakamura, K.A.P. Costa, and João P. Papa An optimum-path forest framework for intrusion detection in computer networks Eng. Appl. Artif. Intell. 25 6 2012 1226 1234
-
(2012)
Eng. Appl. Artif. Intell.
, vol.25
, Issue.6
, pp. 1226-1234
-
-
Pereira, C.R.1
Nakamura, R.Y.M.2
Costa, K.A.P.3
Papa, J.P.4
-
34
-
-
0038663185
-
Intrusion detection with unlabeled data using clustering
-
Leonid Portnoy, Eleazar Eskin, Sal Stolfo, Intrusion detection with unlabeled data using clustering, in: Proceedings of ACM CSS Workshop on Data Mining Applied to Security, 2001, pp. 5-8.
-
(2001)
Proceedings of ACM CSS Workshop on Data Mining Applied to Security
, pp. 5-8
-
-
Portnoy, L.1
Eskin, E.2
Stolfo, S.3
-
35
-
-
84896335131
-
A boundary restricted adaptive particle swarm optimization for data clustering
-
S. Rana, S. Jasola, and R. Kumar A boundary restricted adaptive particle swarm optimization for data clustering Int. J. Mach. Learn. Cybern. 2012 1 10
-
(2012)
Int. J. Mach. Learn. Cybern.
, pp. 1-10
-
-
Rana, S.1
Jasola, S.2
Kumar, R.3
-
37
-
-
67049098756
-
Data clustering as an optimum-path forest problem with applications in image analysis
-
L.M. Rocha, F.A.M. Cappabianco, and A.X. Falcão Data clustering as an optimum-path forest problem with applications in image analysis Int. J. Imaging Syst. Technol. 19 2 2009 50 68
-
(2009)
Int. J. Imaging Syst. Technol.
, vol.19
, Issue.2
, pp. 50-68
-
-
Rocha, L.M.1
Cappabianco, F.A.M.2
Falcão, A.X.3
-
38
-
-
84877964844
-
A data reduction and organization approach for efficient image annotation
-
ACM Coimbra, Portugal
-
P.T.M. Saito, P.J. de Rezende, A.X. Falcão, C.T.N. Suzuki, and J.F. Gomes A data reduction and organization approach for efficient image annotation Proceedings of the 28th Symposium on Applied Computing 2013 ACM Coimbra, Portugal 53 57
-
(2013)
Proceedings of the 28th Symposium on Applied Computing
, pp. 53-57
-
-
Saito, P.T.M.1
De Rezende, P.J.2
Falcão, A.X.3
Suzuki, C.T.N.4
Gomes, J.F.5
-
39
-
-
84872248901
-
A survey on anomaly detection in network intrusion detection system using particle swarm optimization based machine learning techniques
-
Suresh Chandra Satapathy, Siba K. Udgata, Bhabendra Narayan Biswal, Advances in Intelligent Systems and Computing Springer Berlin Heidelberg
-
Khushboo Satpute, Shikha Agrawal, Jitendra Agrawal, and Sanjeev Sharma A survey on anomaly detection in network intrusion detection system using particle swarm optimization based machine learning techniques Suresh Chandra Satapathy, Siba K. Udgata, Bhabendra Narayan Biswal, Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) Advances in Intelligent Systems and Computing vol. 199 2013 Springer Berlin Heidelberg 441 452
-
(2013)
Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA)
, vol.199
, pp. 441-452
-
-
Satpute, K.1
Agrawal, S.2
Agrawal, J.3
Sharma, S.4
-
42
-
-
84859430323
-
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
-
Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, and Ali A. Ghorbani Toward developing a systematic approach to generate benchmark datasets for intrusion detection Comput. Secur. 31 3 2012 357 374
-
(2012)
Comput. Secur.
, vol.31
, Issue.3
, pp. 357-374
-
-
Shiravi, A.1
Shiravi, H.2
Tavallaee, M.3
Ghorbani, A.A.4
-
45
-
-
80053013674
-
Online detection of network traffic anomalies using degree distributions
-
W. Wang, and W. Wu Online detection of network traffic anomalies using degree distributions Int. J. Commun. Network Syst. Sci. 3 2 2010 177 182
-
(2010)
Int. J. Commun. Network Syst. Sci.
, vol.3
, Issue.2
, pp. 177-182
-
-
Wang, W.1
Wu, W.2
-
46
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: A review
-
S.X. Wu, and W. Banzhaf The use of computational intelligence in intrusion detection systems: a review Appl. Soft Comput. 10 1 2010 1 35
-
(2010)
Appl. Soft Comput.
, vol.10
, Issue.1
, pp. 1-35
-
-
Wu, S.X.1
Banzhaf, W.2
-
47
-
-
80955136867
-
Particle swarm optimization-based dimensionality reduction for hyperspectral image classification
-
H. Yang, Q. Du, Particle swarm optimization-based dimensionality reduction for hyperspectral image classification, in: IEEE International Geoscience and Remote Sensing Symposium, 2011, pp. 2357-2360.
-
(2011)
IEEE International Geoscience and Remote Sensing Symposium
, pp. 2357-2360
-
-
Yang, H.1
Du, Q.2
-
48
-
-
79953855364
-
Firefly algorithm, stochastic test functions and design optimisation
-
Xin-She Yang Firefly algorithm, stochastic test functions and design optimisation Int. J. Bio-Inspired Comput. 2 2 2010 78 84
-
(2010)
Int. J. Bio-Inspired Comput.
, vol.2
, Issue.2
, pp. 78-84
-
-
Yang, X.-S.1
-
50
-
-
84863857333
-
Bat algorithm: A novel approach for global engineering optimization
-
Xin-She Yang, and Amir Hossein Gandomi Bat algorithm: a novel approach for global engineering optimization Eng. Comput. 29 5 2012 464 483
-
(2012)
Eng. Comput.
, vol.29
, Issue.5
, pp. 464-483
-
-
Yang, X.-S.1
Gandomi, A.H.2
-
51
-
-
84890765779
-
Bat algorithm: Literature review and applications
-
Xin-She Yang, and Xingshi He Bat algorithm: literature review and applications Int. J. Bio-Inspired Comput. 5 3 2013 141 149
-
(2013)
Int. J. Bio-Inspired Comput.
, vol.5
, Issue.3
, pp. 141-149
-
-
Yang, X.-S.1
He, X.2
|