Genetic Programming Feature Extraction with Different Robust Classifiers for Network Intrusion Detection
暂无分享,去创建一个
[1] William B. Langdon,et al. Application of Genetic Programming to Induction of Linear Classification Trees , 2000, EuroGP.
[2] Gilles Louppe,et al. Independent consultant , 2013 .
[3] Carlos Martín-Vide,et al. Evolutionary Design of Intrusion Detection Programs , 2007, Int. J. Netw. Secur..
[4] Amara Lynn Graps,et al. An introduction to wavelets , 1995 .
[5] Huan Liu,et al. Feature Selection: An Ever Evolving Frontier in Data Mining , 2010, FSDM.
[6] Zhiyong Zeng,et al. Feature Selection Based on Dependency Margin , 2015, IEEE Transactions on Cybernetics.
[7] Wei Lu,et al. Detecting New Forms of Network Intrusion Using Genetic Programming , 2004, Comput. Intell..
[8] Chris Triggs,et al. Mathematics prevents bloat [genetic programming] , 2005, 2005 IEEE Congress on Evolutionary Computation.
[9] Kamel Faraoun,et al. Genetic Programming Approach for Multi-Category Pattern Classification Applied to Network Intrusions Detection , 2006, Int. Arab J. Inf. Technol..
[10] Krzysztof Krawiec,et al. Genetic Programming-based Construction of Features for Machine Learning and Knowledge Discovery Tasks , 2002, Genetic Programming and Evolvable Machines.
[11] A. Bennett. The Origin of Species by means of Natural Selection; or the Preservation of Favoured Races in the Struggle for Life , 1872, Nature.
[12] Walter Alden Tackett,et al. Genetic Programming for Feature Discovery and Image Discrimination , 1993, ICGA.
[13] Huan Liu,et al. Toward integrating feature selection algorithms for classification and clustering , 2005, IEEE Transactions on Knowledge and Data Engineering.
[14] Mengjie Zhang,et al. Particle Swarm Optimization for Feature Selection in Classification: A Multi-Objective Approach , 2013, IEEE Transactions on Cybernetics.
[15] Annie S. Wu,et al. Bloat is Unnatural: An Analysis of Changes in Variable Chromosome Length Absent Selection Pressure , 2004 .
[16] Huan Liu,et al. Manipulating Data and Dimension Reduction Methods: Feature Selection , 2009, Encyclopedia of Complexity and Systems Science.
[17] Nguyen Xuan Hoai,et al. Malware detection using genetic programming , 2014, the 2014 Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA).
[18] Henri Luchian,et al. Feature Extraction Using Genetic Programming with Applications in Malware Detection , 2015, 2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC).
[19] John R. Koza,et al. Genetic programming - on the programming of computers by means of natural selection , 1993, Complex adaptive systems.
[20] Grant Dick,et al. Implicitly Controlling Bloat in Genetic Programming , 2010, IEEE Transactions on Evolutionary Computation.
[21] Matthew J. Streeter,et al. The Root Causes of Code Growth in Genetic Programming , 2003, EuroGP.
[22] Erik D. Goodman,et al. Genetic programming for improved data mining: application to the biochemistry of protein interactions , 1996 .
[23] Ruhul A. Sarker,et al. Survey of Uses of Evolutionary Computation Algorithms and Swarm Intelligence for Network Intrusion Detection , 2015, Int. J. Comput. Intell. Appl..
[24] Malcolm I. Heywood,et al. A Linear Genetic Programming Approach to Intrusion Detection , 2003, GECCO.
[25] Peter Rockett,et al. Multi-class pattern classification using single, multi-dimensional feature-space feature extraction evolved by multi-objective genetic programming and its application to network intrusion detection , 2011, Genetic Programming and Evolvable Machines.
[26] Arturo Ribagorda,et al. Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming , 2010, 2010 International Conference on Availability, Reliability and Security.
[27] Manabu Kotani,et al. Feature extraction using evolutionary computation , 1999, Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No. 99TH8406).