A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection
暂无分享,去创建一个
Zhong Jin | Siyang Zhang | Fangjun Kuang | Weihong Xu | Zhong Jin | Fangjun Kuang | Weihong Xu | Siyang Zhang
[1] Ajith Abraham,et al. Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..
[2] S. Karthikeyan,et al. An ensemble design of intrusion detection system for handling uncertainty using Neutrosophic Logic Classifier , 2012, Knowl. Based Syst..
[3] Yongdae Kim,et al. A machine learning framework for network anomaly detection using SVM and GA , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[4] Haixia Xu,et al. Adaptive Kernel Principal Analysis for Online Feature Extraction , 2009 .
[5] Shi-Jinn Horng,et al. A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..
[6] Qingsheng Zhu,et al. Finding key attribute subset in dataset for outlier detection , 2011, Knowl. Based Syst..
[7] Hussein A. Abbass,et al. An adaptive genetic-based signature learning system for intrusion detection , 2009, Expert Syst. Appl..
[8] Chih-Jen Lin,et al. A Practical Guide to Support Vector Classication , 2008 .
[9] Georgios Kambourakis,et al. Swarm intelligence in intrusion detection: A survey , 2011, Comput. Secur..
[10] Ge Li,et al. Network intrusion detection based on least squares support vector machine and chaos particle swarm optimization algorithm , 2012 .
[11] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[12] V. Rao Vemuri,et al. Robust Support Vector Machines for Anomaly Detection in Computer Security , 2003, ICMLA.
[13] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[14] Lekha Bhambhu,et al. DATA CLASSIFICATION USING SUPPORT VECTOR MACHINE , 2009 .
[15] Fei Ren,et al. Using Density-Based Incremental Clustering for Anomaly Detection , 2008, 2008 International Conference on Computer Science and Software Engineering.
[16] Tai-Myoung Chung,et al. Effective Value of Decision Tree with KDD 99 Intrusion Detection Datasets for Intrusion Detection System , 2008, 2008 10th International Conference on Advanced Communication Technology.
[17] Li-Li Bing. Chaos Optimization Method and Its Application , 1997 .
[18] Zhenguo Chen,et al. Minimax Probability Machine Classifier with Feature Extraction by Kernel Pca for Intrusion Detection , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[19] Roberto Battiti,et al. Identifying intrusions in computer networks with principal component analysis , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[20] Chih-Fong Tsai,et al. A triangle area based nearest neighbors approach to intrusion detection , 2010, Pattern Recognit..
[21] Siyang Zhang,et al. A novel hybrid KPCA and SVM with GA model for intrusion detection , 2014, Appl. Soft Comput..
[22] S. Srinoy,et al. Anomaly-Based Intrusion Detection using Fuzzy Rough Clustering , 2006, 2006 International Conference on Hybrid Information Technology.
[23] Eleazar Eskin,et al. Anomaly Detection over Noisy Data using Learned Probability Distributions , 2000, ICML.
[24] Surat Srinoy,et al. Intrusion Detection Model Based On Particle Swarm Optimization and Support Vector Machine , 2007, 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications.
[25] Ke Liu,et al. A Novel Approach of KPCA and SVM for Intrusion Detection , 2012 .
[26] Xu Hong,et al. A Real-time Intrusion Detection System Based on PSO-SVM , 2009 .
[27] Jian Ma,et al. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..
[28] Bernhard Schölkopf,et al. Nonlinear Component Analysis as a Kernel Eigenvalue Problem , 1998, Neural Computation.
[29] Hong Shen,et al. Application of online-training SVMs for real-time intrusion detection with different considerations , 2005, Comput. Commun..
[30] H. Deutsch. Principle Component Analysis , 2004 .
[31] Bhavani M. Thuraisingham,et al. A new intrusion detection system using support vector machines and hierarchical clustering , 2007, The VLDB Journal.