Performance Analysis Of Different Feature Selection Methods In Intrusion Detection
暂无分享,去创建一个
[1] Philip M. Lewis,et al. The characteristic selection problem in recognition systems , 1962, IRE Trans. Inf. Theory.
[2] Ron Kohavi,et al. Irrelevant Features and the Subset Selection Problem , 1994, ICML.
[3] Slobodan Petrovic,et al. Improving Effectiveness of Intrusion Detection by Correlation Feature Selection , 2010, 2010 International Conference on Availability, Reliability and Security.
[4] Sanmay Das,et al. Filters, Wrappers and a Boosting-Based Hybrid for Feature Selection , 2001, ICML.
[5] Michael I. Jordan,et al. Feature selection for high-dimensional genomic microarray data , 2001, ICML.
[6] Xingyu Gong,et al. Feature selection method for network intrusion based on GQPSO attribute reduction , 2011, 2011 International Conference on Multimedia Technology.
[7] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[8] Huan Liu,et al. Toward integrating feature selection algorithms for classification and clustering , 2005, IEEE Transactions on Knowledge and Data Engineering.
[9] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[10] Pat Langley,et al. Selection of Relevant Features and Examples in Machine Learning , 1997, Artif. Intell..
[11] Ron Kohavi,et al. Wrappers for Feature Subset Selection , 1997, Artif. Intell..
[12] Jaideep Srivastava,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.
[13] Andrew H. Sung,et al. Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..
[14] Eugene H. Spafford,et al. A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .
[15] Huan Liu,et al. Feature Selection for Classification , 1997, Intell. Data Anal..