Machine Learning Applied to Cyber Operations
暂无分享,去创建一个
[1] H. B. Barlow,et al. Possible Principles Underlying the Transformations of Sensory Messages , 2012 .
[2] Vipin Kumar,et al. Introduction to Data Mining , 2022, Data Mining and Machine Learning Applications.
[3] Malcolm I. Heywood,et al. Generating mimicry attacks using genetic programming: A benchmarking study , 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security.
[4] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[5] Jinsha Yuan,et al. K-Mean Algorithm with a Distance Based on the Characteristic of Differences , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[6] Misty Blowers,et al. Analysis of machine learning models and prediction tools for paper machine systems , 2010 .
[7] Huaiyu Zhu,et al. No Free Lunch for Cross-Validation , 1996, Neural Computation.
[8] David H. Wolpert,et al. The Lack of A Priori Distinctions Between Learning Algorithms , 1996, Neural Computation.
[9] David G. Stork,et al. Pattern classification, 2nd Edition , 2000 .
[10] Dimitrios Gunopulos,et al. Locally Adaptive Metric Nearest-Neighbor Classification , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[11] Lotfi A. Zadeh,et al. Fuzzy Sets , 1996, Inf. Control..
[12] Eric B. Baum,et al. Supervised Learning of Probability Distributions by Neural Networks , 1987, NIPS.
[13] Nicu Sebe,et al. Distance Learning for Similarity Estimation , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[14] Glenn A. Fink,et al. Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies , 2012 .
[15] J M Smith,et al. Evolution and the theory of games , 1976 .
[16] Brian Everitt,et al. Cluster analysis , 1974 .
[17] John R. Woodward,et al. Computable and incomputable functions and search algorithms , 2009, 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems.
[18] Michael I. Jordan,et al. Distance Metric Learning with Application to Clustering with Side-Information , 2002, NIPS.
[19] Laurie J. Heyer,et al. Exploring expression data: identification and analysis of coexpressed genes. , 1999, Genome research.
[20] Susan M. Bridges,et al. FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .
[21] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[22] Kishan G. Mehrotra,et al. Elements of artificial neural networks , 1996 .
[23] Glenn J. Myatt. Making Sense of Data I: A Practical Guide to Exploratory Data Analysis and Data Mining , 2006 .
[24] Wei Li,et al. Using Genetic Algorithm for Network Intrusion Detection , 2004 .
[25] David G. Stork,et al. Pattern Classification , 1973 .
[26] Glenn J. Myatt. Making Sense of Data , 2007 .
[27] H. B. Barlow,et al. Unsupervised Learning , 1989, Neural Computation.
[28] Amit Chugh. GHIDS: A HYBRID HONEYPOT SYSTEM USING GENETIC ALGORITHM , 2012 .