메뉴 건너뛰기




Volumn 625, Issue , 2016, Pages 427-438

Intrusion detection using improved decision tree algorithm with binary and quad split

Author keywords

Binary split; Decision tree; Intrusion detection; KDD 1999; Quad split

Indexed keywords

BINARY TREES; BINS; COMPUTER CRIME; DECISION TREES; DENIAL-OF-SERVICE ATTACK; INTRUSION DETECTION; MERCURY (METAL); PROBES; TREES (MATHEMATICS);

EID: 84989886671     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-981-10-2738-3_37     Document Type: Conference Paper
Times cited : (20)

References (22)
  • 4
    • 77953883563 scopus 로고    scopus 로고
    • Serdang: Intrusion detection using data mining techniques
    • IEEE
    • Ektefa, M., Memar, S., Serdang: Intrusion detection using data mining techniques. In: CAMP, pp. 200-203. IEEE (2010)
    • (2010) CAMP , pp. 200-203
    • Ektefa, M.1    Memar, S.2
  • 5
    • 84861508446 scopus 로고    scopus 로고
    • Analysis of KDD 99 intrusion detection dataset for selection of relevance features
    • Adetunmbi, A., Adeola, S., Abosede, O.: Analysis of KDD 99 intrusion detection dataset for selection of relevance features. In: WCECS, pp. 162-168 (2010)
    • (2010) WCECS , pp. 162-168
    • Adetunmbi, A.1    Adeola, S.2    Abosede, O.3
  • 6
    • 84938927708 scopus 로고    scopus 로고
    • Intrusion detection system using bagging with partial decision treebase classifier
    • Elsevier
    • Gaikwad, D.P., Thool, R.: Intrusion detection system using bagging with partial decision treebase classifier. In: ICAC3, pp. 92-98. Elsevier (2015)
    • (2015) ICAC3 , pp. 92-98
    • Gaikwad, D.P.1    Thool, R.2
  • 7
    • 84938933354 scopus 로고    scopus 로고
    • Intrusion detection system (IDS): Anomaly detection using outlier detection approach
    • Elsevier
    • Jabez, J., Muthukumar, B.: Intrusion detection system (IDS): anomaly detection using outlier detection approach. In: ICCC, pp. 338-346. Elsevier (2015)
    • (2015) ICCC , pp. 338-346
    • Jabez, J.1    Muthukumar, B.2
  • 8
    • 58349096877 scopus 로고    scopus 로고
    • Data mining-based intrusion detectors
    • Elsevier
    • Wua, S.Y., Yen, E.: Data mining-based intrusion detectors. Expert Syst. Appl. 36(3), 5605-5612 (2009). Elsevier
    • (2009) Expert Syst. Appl , vol.36 , Issue.3 , pp. 5605-5612
    • Wua, S.Y.1    Yen, E.2
  • 13
    • 78649746673 scopus 로고    scopus 로고
    • A comparative study of bagging, boosting and C4.5
    • Subrata, S.P.N., Kumar, B.I.: A comparative study of bagging, boosting and C4.5. Asian J. Inf. Techn. 9, 300-306 (2010)
    • (2010) Asian J. Inf. Techn , vol.9 , pp. 300-306
    • Subrata, S.P.N.1    Kumar, B.I.2
  • 14
    • 84876485723 scopus 로고    scopus 로고
    • Decision trees: A recent overview
    • Springer Science and business media
    • Kotsiantis, S.B.: Decision trees: a recent overview. Artif. Intell. Rev. 39, 261-283 (2011). Springer Science and business media
    • (2011) Artif. Intell. Rev , vol.39 , pp. 261-283
    • Kotsiantis, S.B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.