-
1
-
-
84899721363
-
-
Elsevier, China
-
Chen, T., Zhang, X., Kim, S.: Efficient classification using parallel scalable compressed model and its application, pp. 5972-5983. Elsevier, China (2014)
-
(2014)
Efficient Classification Using Parallel Scalable Compressed Model and Its Application
, pp. 5972-5983
-
-
Chen, T.1
Zhang, X.2
Kim, S.3
-
2
-
-
84925843430
-
-
IEEE, USA
-
David, J., Borghetti, J., Angela, A.: Survey of Distance and Similarity Measures Used Within NW Intrusion Anomaly Detection, pp. 70-91. IEEE, USA (2015)
-
(2015)
Survey of Distance and Similarity Measures Used within NW Intrusion Anomaly Detection
, pp. 70-91
-
-
David, J.1
Borghetti, J.2
Angela, A.3
-
3
-
-
84977988861
-
Improved C4.5 algorithm for rule based classification
-
ACM
-
Mazid, M.M., Ali, S., Tickle, K.: Improved C4.5 algorithm for rule based classification. In: Recent Advances in AI knowledge Engineering and Data Bases, pp. 296-301. ACM (2010)
-
(2010)
Recent Advances in AI Knowledge Engineering and Data Bases
, pp. 296-301
-
-
Mazid, M.M.1
Ali, S.2
Tickle, K.3
-
4
-
-
77953883563
-
Serdang: Intrusion detection using data mining techniques
-
IEEE
-
Ektefa, M., Memar, S., Serdang: Intrusion detection using data mining techniques. In: CAMP, pp. 200-203. IEEE (2010)
-
(2010)
CAMP
, pp. 200-203
-
-
Ektefa, M.1
Memar, S.2
-
5
-
-
84861508446
-
Analysis of KDD 99 intrusion detection dataset for selection of relevance features
-
Adetunmbi, A., Adeola, S., Abosede, O.: Analysis of KDD 99 intrusion detection dataset for selection of relevance features. In: WCECS, pp. 162-168 (2010)
-
(2010)
WCECS
, pp. 162-168
-
-
Adetunmbi, A.1
Adeola, S.2
Abosede, O.3
-
6
-
-
84938927708
-
Intrusion detection system using bagging with partial decision treebase classifier
-
Elsevier
-
Gaikwad, D.P., Thool, R.: Intrusion detection system using bagging with partial decision treebase classifier. In: ICAC3, pp. 92-98. Elsevier (2015)
-
(2015)
ICAC3
, pp. 92-98
-
-
Gaikwad, D.P.1
Thool, R.2
-
7
-
-
84938933354
-
Intrusion detection system (IDS): Anomaly detection using outlier detection approach
-
Elsevier
-
Jabez, J., Muthukumar, B.: Intrusion detection system (IDS): anomaly detection using outlier detection approach. In: ICCC, pp. 338-346. Elsevier (2015)
-
(2015)
ICCC
, pp. 338-346
-
-
Jabez, J.1
Muthukumar, B.2
-
8
-
-
58349096877
-
Data mining-based intrusion detectors
-
Elsevier
-
Wua, S.Y., Yen, E.: Data mining-based intrusion detectors. Expert Syst. Appl. 36(3), 5605-5612 (2009). Elsevier
-
(2009)
Expert Syst. Appl
, vol.36
, Issue.3
, pp. 5605-5612
-
-
Wua, S.Y.1
Yen, E.2
-
11
-
-
77950575061
-
A detailed analysis of the KDD CUP 99 data set
-
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Applications (2009)
-
(2009)
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Applications
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.A.4
-
13
-
-
78649746673
-
A comparative study of bagging, boosting and C4.5
-
Subrata, S.P.N., Kumar, B.I.: A comparative study of bagging, boosting and C4.5. Asian J. Inf. Techn. 9, 300-306 (2010)
-
(2010)
Asian J. Inf. Techn
, vol.9
, pp. 300-306
-
-
Subrata, S.P.N.1
Kumar, B.I.2
-
14
-
-
84876485723
-
Decision trees: A recent overview
-
Springer Science and business media
-
Kotsiantis, S.B.: Decision trees: a recent overview. Artif. Intell. Rev. 39, 261-283 (2011). Springer Science and business media
-
(2011)
Artif. Intell. Rev
, vol.39
, pp. 261-283
-
-
Kotsiantis, S.B.1
-
18
-
-
84963773043
-
Evaluation of feature selection and reduction algorithms for network IDS data
-
London
-
Bjerkestrand, T., Tsaptsinos, D., Pfluegel, E.: Evaluation of feature selection and reduction algorithms for network IDS data. In: Cyber Situational Awareness (CyberSA), London, pp. 1-2 (2015)
-
(2015)
Cyber Situational Awareness (Cybersa)
, pp. 1-2
-
-
Bjerkestrand, T.1
Tsaptsinos, D.2
Pfluegel, E.3
-
22
-
-
78650537521
-
Re optimization of ID3 and C4 5 decision tree
-
Thakur, D., Markandaiah, N., Sharan Raj, D.: Re optimization of ID3 and C4. 5 decision tree. In: 2010 International Conference on IEEE Computer and Communication Technology (ICCCT), pp. 448-450 (2010)
-
(2010)
2010 International Conference on IEEE Computer and Communication Technology (ICCCT)
, pp. 448-450
-
-
Thakur, D.1
Markandaiah, N.2
Sharan Raj, D.3
|