Penalty-Reward Based Instance Selection Method in Cloud Environment Using the Concept of Nearest Neighbor
暂无分享,去创建一个
[1] Nicolás García-Pedrajas,et al. Democratic instance selection: A linear complexity instance selection algorithm based on classifier ensemble concepts , 2010, Artif. Intell..
[2] Dennis L. Wilson,et al. Asymptotic Properties of Nearest Neighbor Rules Using Edited Data , 1972, IEEE Trans. Syst. Man Cybern..
[3] Nitasha Hasteer,et al. Intrusion Detection and Prevention in Cloud Environment: A Systematic Review , 2013 .
[4] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[5] Partha Ghosh,et al. An Efficient Hybrid Multilevel Intrusion Detection System in Cloud Environment , 2014 .
[6] Pritika Mehra,et al. A brief study and comparison of Snort and Bro Open Source Network Intrusion Detection Systems , 2012 .
[7] Huan Liu,et al. On Issues of Instance Selection , 2002, Data Mining and Knowledge Discovery.
[8] T. Basar,et al. Intrusion Response as a Resource Allocation Problem , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.
[9] Padhraic Smyth,et al. Knowledge Discovery and Data Mining: Towards a Unifying Framework , 1996, KDD.
[10] G. Gates,et al. The reduced nearest neighbor rule (Corresp.) , 1972, IEEE Trans. Inf. Theory.
[11] Swarnpreet Singh,et al. Cost breakdown of Public Cloud Computing and Private Cloud Computing and Security Issues , 2012 .
[12] Feng Pan,et al. Analyzing the Energy-Time Trade-Off in High-Performance Computing Applications , 2007, IEEE Transactions on Parallel and Distributed Systems.
[13] Hugh B. Woodruff,et al. An algorithm for a selective nearest neighbor decision rule (Corresp.) , 1975, IEEE Trans. Inf. Theory.
[14] Partha Ghosh,et al. An Efficient Cloud Network Intrusion Detection System , 2015 .
[15] Hui Xiong,et al. Enhancing data analysis with noise removal , 2006, IEEE Transactions on Knowledge and Data Engineering.
[16] Marcin Blachnik,et al. Ensembles of Instance Selection Methods based on Feature Subset , 2014, KES.
[17] Roberto Di Pietro,et al. Secure virtualization for cloud computing , 2011, J. Netw. Comput. Appl..
[18] Trent Jaeger,et al. Process firewalls: protecting processes during resource access , 2013, EuroSys '13.
[19] Peter E. Hart,et al. The condensed nearest neighbor rule (Corresp.) , 1968, IEEE Trans. Inf. Theory.
[20] Rajkumar Buyya,et al. Utility Computing on Global Grids , 2012 .
[21] G. Gates. The Reduced Nearest Neighbor Rule , 1998 .
[22] Ron Kohavi,et al. Wrappers for Feature Subset Selection , 1997, Artif. Intell..
[23] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[24] Ahmed Shawish,et al. Cloud Computing: Paradigms and Technologies , 2014 .