Naive Bayes vs decision trees in intrusion detection systems
暂无分享,去创建一个
[1] J. Ross Quinlan,et al. Bagging, Boosting, and C4.5 , 1996, AAAI/IAAI, Vol. 1.
[2] Gregory F. Cooper,et al. The Computational Complexity of Probabilistic Inference Using Bayesian Belief Networks , 1990, Artif. Intell..
[3] Judea Pearl,et al. Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.
[4] Sandeep Kumar,et al. A Software Architecture to Support Misuse Intrusion Detection , 1995 .
[5] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[6] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[7] Ronald L. Rivest,et al. Constructing Optimal Binary Decision Trees is NP-Complete , 1976, Inf. Process. Lett..
[8] Alfonso Valdes,et al. Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.
[9] George H. John. Enhancements to the data mining process , 1997 .
[10] Martin Roesch,et al. SNORT: The Open Source Network Intrusion Detection System 1 , 2002 .
[11] Finn Verner Jensen,et al. Introduction to Bayesian Networks , 2008, Innovations in Bayesian Networks.
[12] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[13] Aiko M. Hormann,et al. Programs for Machine Learning. Part I , 1962, Inf. Control..
[14] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[15] Leo Breiman,et al. Classification and Regression Trees , 1984 .