-
1
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
Ilgun, K., Kemmerer, R.A., Porras, P.A.: State transition analysis: a rule-based intrusion detection approach. IEEE Trans. Softw. Eng. 21(3), 181–199 (1995)
-
(1995)
IEEE Trans. Softw. Eng.
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
2
-
-
84978100714
-
Improving accuracy of intrusion detection model using PCA and optimized SVM[J]
-
Ikram, S.T., Cherukuri, A.K.: Improving accuracy of intrusion detection model using PCA and optimized SVM[J]. CIT. J. Comput. Inf. Technol. 24(2), 133–148 (2016)
-
(2016)
CIT. J. Comput. Inf. Technol.
, vol.24
, Issue.2
, pp. 133-148
-
-
Ikram, S.T.1
Cherukuri, A.K.2
-
3
-
-
10944272650
-
Extreme learning machine: A new learning scheme of feedforward neural networks
-
Huang, G.B., Zhu, Q.Y., Siew, C.K.: Extreme learning machine: a new learning scheme of feedforward neural networks. In: Proceedings of International Joint Conference on Neural Networks (IJCNN2004), vol. 2, no. 25–29, pp. 985–990
-
In: Proceedings of International Joint Conference on Neural Networks (IJCNN2004)
, vol.2
, Issue.2529
, pp. 985-990
-
-
Huang, G.B.1
Zhu, Q.Y.2
Siew, C.K.3
-
4
-
-
33745903481
-
Extreme learning machine: Theory and applications
-
Huang, G.B., Zhu, Q.Y., Siew, C.K.: Extreme learning machine: theory and applications. Neurocomputing 70(1–3), 489–501
-
Neurocomputing
, vol.70
, Issue.13
, pp. 489-501
-
-
Huang, G.B.1
Zhu, Q.Y.2
Siew, C.K.3
-
5
-
-
38149089513
-
Efficient BP algorithms for general feedforward neural networks
-
Springer, Heidelberg
-
Espana-Boquera, S., Zamora-Martínez, F., Castro-Bleda, M.J., et al.: Efficient BP algorithms for general feedforward neural networks. In: International Work-Conference on the Interplay Between Natural and Artificial Computation (pp. 327–336). Springer, Heidelberg (2007)
-
(2007)
International Work-Conference on the Interplay between Natural and Artificial Computation
, pp. 327-336
-
-
Espana-Boquera, S.1
Zamora-Martínez, F.2
Castro-Bleda, M.J.3
-
6
-
-
85028098285
-
Parametric methods for anomaly detection in aggregate traffic
-
Thatte, G., Mitra, U., Heidemann, J.: Parametric methods for anomaly detection in aggregate traffic. IEEE/ACM Trans. Netw. 19(2), 512–525 (2011)
-
(2011)
IEEE/ACM Trans. Netw.
, vol.19
, Issue.2
, pp. 512-525
-
-
Thatte, G.1
Mitra, U.2
Heidemann, J.3
-
7
-
-
18844388178
-
Frequent episode rules for internet anomaly detection
-
Qin, M., Hwang, K.: Frequent episode rules for internet anomaly detection. In: Proceedings of the Network Computing and Applications, Third IEEE International Symposium. Washington, DC, USA: IEEE Computer Society, pp. 161–168 (2004)
-
(2004)
Proceedings of the Network Computing and Applications
, pp. 161-168
-
-
Qin, M.1
Hwang, K.2
-
8
-
-
58549115037
-
Remote detection of bottleneck links using spectral and statistical methods
-
He, X., Papadopoulos, C., Heidemann, J., Mitra, U., Riaz, U.: Remote detection of bottleneck links using spectral and statistical methods. Comput. Netw. 53, 279–298 (2009)
-
(2009)
Comput. Netw.
, vol.53
, pp. 279-298
-
-
He, X.1
Papadopoulos, C.2
Heidemann, J.3
Mitra, U.4
Riaz, U.5
-
10
-
-
34249753618
-
Support-vector networks
-
Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20, 273–297 (1995)
-
(1995)
Mach. Learn.
, vol.20
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
-
11
-
-
79958178274
-
Extreme learning machines: A survey
-
Huang, G.-B., Wang, D.H., Lan, Y.: Extreme learning machines: a survey. Int. J. Mach. Lean. Cybern. 2(2), 107–122 (2011)
-
(2011)
Int. J. Mach. Lean. Cybern.
, vol.2
, Issue.2
, pp. 107-122
-
-
Huang, G.-B.1
Wang, D.H.2
Lan, Y.3
-
12
-
-
36849030790
-
Weighting versus pruning in rule validation for detecting network and host anomalies
-
Tandon, G.: Weighting versus pruning in rule validation for detecting network and host anomalies. In: Proceedings of the 13th ACM SIGKDD international. ACM Press (2007)
-
(2007)
Proceedings of the 13Th ACM SIGKDD International
-
-
Tandon, G.1
-
13
-
-
0036321445
-
Use of k-nearest neighbor classifier for intrusion detection
-
Liao, Y., Vemuri, V.R.: Use of k-nearest neighbor classifier for intrusion detection. Comput. Secur. 25, 439–448 (2002)
-
(2002)
Comput. Secur
, vol.25
, pp. 439-448
-
-
Liao, Y.1
Vemuri, V.R.2
-
14
-
-
0142000477
-
Differential evolution—a simple and efficient heuristic for global optimization over continuous spaces
-
Storn, R., Price, K.: Differential evolution—a simple and efficient heuristic for global optimization over continuous spaces. J. Glob. Optim. 11(4), 341–359 (2004)
-
(2004)
J. Glob. Optim
, vol.11
, Issue.4
, pp. 341-359
-
-
Storn, R.1
Price, K.2
-
15
-
-
0037312458
-
Differential evolution training algorithm for feedforward neural networks
-
Ilonen, J., Kamarainen, J.I., Lampinen, J.: Differential evolution training algorithm for feedforward neural networks. Neural Process. Lett. 17, 93–105 (2003)
-
(2003)
Neural Process. Lett
, vol.17
, pp. 93-105
-
-
Ilonen, J.1
Kamarainen, J.I.2
Lampinen, J.3
-
16
-
-
42449127855
-
Differential evolution and levenberg marquardt trained neural network scheme for nonlinear system identification
-
Subudhi, B., Jena, D.: Differential evolution and levenberg marquardt trained neural network scheme for nonlinear system identification. Neural Process. Lett. 27, 285–296 (2008)
-
(2008)
Neural Process. Lett.
, vol.27
, pp. 285-296
-
-
Subudhi, B.1
Jena, D.2
-
17
-
-
22844440904
-
Evolutionary extreme learning machine
-
Zhu, Q.-Y., Qin, A.-K., Suganthan, P.-N., Huang, G.-B.: Evolutionary extreme learning machine. Pattern Recog. 38(10), 1759–1763 (2005)
-
(2005)
Pattern Recog
, vol.38
, Issue.10
, pp. 1759-1763
-
-
Zhu, Q.-Y.1
Qin, A.-K.2
Suganthan, P.-N.3
Huang, G.-B.4
-
18
-
-
85031416901
-
-
KDDCUPdataset: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (1999)
-
(1999)
-
-
-
20
-
-
0142187790
-
-
Luo, M., Wang, L., Zhang, H., Chen, J.: A research on intrusion detection based on unsupervised clustering and support vector machine. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 325–336. Springer, Heidelberg (2003). doi:10.1007/978-3-540-39927-8_30
-
(2003)
A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine
, vol.2836
, pp. 325-336
-
-
Luo, M.1
Wang, L.2
Zhang, H.3
Chen, J.4
-
21
-
-
24944586818
-
Network-Based Intrusion Detection with Support Vector Machines
-
Kahng, H.-K. (ed.), Springer, Heidelberg
-
Kim, D.S., Park, J.S.: Network-Based Intrusion Detection with Support Vector Machines. In: Kahng, H.-K. (ed.) ICOIN 2003. LNCS, vol. 2662, pp. 747–756. Springer, Heidelberg (2003). doi:10.1007/978-3-540-45235-5_73
-
(2003)
ICOIN 2003. LNCS
, vol.2662
, pp. 747-756
-
-
Kim, D.S.1
Park, J.S.2
-
22
-
-
80052870284
-
Large-scale image classification: Fast feature extraction and SVM training
-
Lin, Y., Lv, F., Zhu S., Yang, M., Cour, T., Yu, K., Cao, L., Huang, T.S.: Large-scale image classification: fast feature extraction and SVM training. In: Proceedings of the 24th IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1689–1696 (2011)
-
(2011)
Proceedings of the 24Th IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
, pp. 1689-1696
-
-
Lin, Y.1
Lv, F.2
Zhu, S.3
Yang, M.4
Cour, T.5
Yu, K.6
Cao, L.7
Huang, T.S.8
-
23
-
-
33745918399
-
Universal approximation using incremental constructive feedforward networks with random hidden nodes
-
Huang, G.-B., Chen, L., Siew, C.K.: Universal approximation using incremental constructive feedforward networks with random hidden nodes. IEEE Trans. Neural Netw. 17(4), 879–892 (2006)
-
(2006)
IEEE Trans. Neural Netw.
, vol.17
, Issue.4
, pp. 879-892
-
-
Huang, G.-B.1
Chen, L.2
Siew, C.K.3
-
24
-
-
0142000477
-
Differential evolution-A simple and efficient heuristic for global optimization over continuous spaces
-
Storn, R., Price, K.: Differential evolution-A simple and efficient heuristic for global optimization over continuous spaces. J. Global Optim. 11, 341–359 (1997)
-
(1997)
J. Global Optim
, vol.11
, pp. 341-359
-
-
Storn, R.1
Price, K.2
-
25
-
-
33847199831
-
Self-adapting control parameters in differential evolution: A comprehensive study on numerical benchmark problems
-
Brest, J., Greiner, S., Bŏskovíc, B., Mernik, M., Žumer, V.: Self-adapting control parameters in differential evolution: A comprehensive study on numerical benchmark problems. IEEE Trans. Evol. Comput. 10, 646–657 (2006)
-
(2006)
IEEE Trans. Evol. Comput.
, vol.10
, pp. 646-657
-
-
Brest, J.1
Greiner, S.2
Bŏskovíc, B.3
Mernik, M.4
Žumer, V.5
-
26
-
-
79957639096
-
Attribute weighting via differential evolution algorithm for attribute weighted naive bayes (WNB
-
Wu, J., Cai, Z.H.: Attribute weighting via differential evolution algorithm for attribute weighted naive bayes (WNB). J. Comput. Inf. Syst. 7, 1672–1679 (2011)
-
(2011)
J. Comput. Inf. Syst
, vol.7
, pp. 1672-1679
-
-
Wu, J.1
Cai, Z.H.2
-
27
-
-
84962238645
-
Costbased modeling for fraud and intrusion detection: Results from the JAM project
-
Stolfo, S., Fan, W., Lee, W., Prodromidis, A., Chan, P.K.: Costbased modeling for fraud and intrusion detection: results from the JAM project. In: Proceedings of DARPA Information Survivability Conference and Exposition, vol. 2, pp. 130–144 (2002)
-
(2002)
In: Proceedings of DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 130-144
-
-
Stolfo, S.1
Fan, W.2
Lee, W.3
Prodromidis, A.4
Chan, P.K.5
|