An improved NSGA-III algorithm for feature selection used in intrusion detection
暂无分享,去创建一个
Zhong Ming | Jianyong Chen | Yingying Zhu | Junwei Liang | Yingying Zhu | Jianyong Chen | Zhong Ming | Junwei Liang
[1] Malcolm I. Heywood,et al. A Hierarchical SOM based Intrusion Detection System , 2008 .
[2] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[3] Mark A. Hall,et al. Correlation-based Feature Selection for Discrete and Numeric Class Machine Learning , 1999, ICML.
[4] Kalyanmoy Deb,et al. A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..
[5] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[6] David E. Goldberg,et al. A niched Pareto genetic algorithm for multiobjective optimization , 1994, Proceedings of the First IEEE Conference on Evolutionary Computation. IEEE World Congress on Computational Intelligence.
[7] John E. Dennis,et al. Normal-Boundary Intersection: A New Method for Generating the Pareto Surface in Nonlinear Multicriteria Optimization Problems , 1998, SIAM J. Optim..
[8] Manas Ranjan Patra,et al. Discriminative multinomial Naïve Bayes for network intrusion detection , 2010, 2010 Sixth International Conference on Information Assurance and Security.
[9] Huan Liu,et al. Efficient Feature Selection via Analysis of Relevance and Redundancy , 2004, J. Mach. Learn. Res..
[10] Antonio Martínez-Álvarez,et al. Feature selection by multi-objective optimisation: Application to network anomaly detection by hierarchical self-organising maps , 2014, Knowl. Based Syst..
[11] Kalyanmoy Deb,et al. Muiltiobjective Optimization Using Nondominated Sorting in Genetic Algorithms , 1994, Evolutionary Computation.
[12] William Cyrus Navidi,et al. Statistics for Engineers and Scientists , 2004 .
[13] Arputharaj Kannan,et al. Decision tree based light weight intrusion detection using a wrapper approach , 2012, Expert Syst. Appl..
[14] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[15] Farookh Khadeer Hussain,et al. Evolutionary algorithm-based multi-objective task scheduling optimization model in cloud environments , 2015, World Wide Web.
[16] Joshua D. Knowles,et al. Feature subset selection in unsupervised learning via multiobjective optimization , 2006 .
[17] Gisung Kim,et al. A novel hybrid intrusion detection method integrating anomaly detection with misuse detection , 2014, Expert Syst. Appl..
[18] Kalyanmoy Deb,et al. Multi-objective optimization using evolutionary algorithms , 2001, Wiley-Interscience series in systems and optimization.
[19] Carlos A. Coello Coello,et al. Ranking Methods for Many-Objective Optimization , 2009, MICAI.
[20] Julio Ortega Lopera,et al. Network Anomaly Classification by Support Vector Classifiers Ensemble and Non-linear Projection Techniques , 2013, HAIS.
[21] Luiz Eduardo Soares de Oliveira,et al. A Methodology for Feature Selection Using Multiobjective Genetic Algorithms for Handwritten Digit String Recognition , 2003, Int. J. Pattern Recognit. Artif. Intell..
[22] Marco Laumanns,et al. Combining Convergence and Diversity in Evolutionary Multiobjective Optimization , 2002, Evolutionary Computation.
[23] Sergios Theodoridis,et al. Pattern Recognition, Fourth Edition , 2008 .
[24] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[25] Kalyanmoy Deb,et al. An Evolutionary Many-Objective Optimization Algorithm Using Reference-Point-Based Nondominated Sorting Approach, Part I: Solving Problems With Box Constraints , 2014, IEEE Transactions on Evolutionary Computation.
[26] Fakhri Karray,et al. Multi-objective Feature Selection with NSGA II , 2007, ICANNGA.
[27] Marco Laumanns,et al. SPEA2: Improving the Strength Pareto Evolutionary Algorithm For Multiobjective Optimization , 2002 .
[28] Adel Sabry Eesa,et al. A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems , 2015, Expert Syst. Appl..
[29] Patrick M. Reed,et al. Diagnostic Assessment of Search Controls and Failure Modes in Many-Objective Evolutionary Optimization , 2012, Evolutionary Computation.
[30] Thomas Weigert,et al. An adaptive automatically tuning intrusion detection system , 2008, TAAS.
[31] R. A. Maxion,et al. Proper Use of ROC Curves in Intrusion/Anomaly Detection , 2004 .
[32] Xiaobo Zhou,et al. A-GHSOM: An adaptive growing hierarchical self organizing map for network anomaly detection , 2012, J. Parallel Distributed Comput..
[33] Taghi M. Khoshgoftaar,et al. Feature Selection with High-Dimensional Imbalanced Data , 2009, 2009 IEEE International Conference on Data Mining Workshops.
[34] C. Emmanouilidis,et al. A multiobjective evolutionary setting for feature selection and a commonality-based crossover operator , 2000, Proceedings of the 2000 Congress on Evolutionary Computation. CEC00 (Cat. No.00TH8512).
[35] Jugal K. Kalita,et al. Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.