A dataset for evaluating intrusion detection systems in IEEE 802.11 wireless networks
暂无分享,去创建一个
Ailton Akira Shinoda | Ruy de Oliveira | Ed' Wilson T. Ferreira | Douglas W. F. L. Vilela | Nelcileno V. de Souza Araujo | Valtemir E. Nascimento | A. Shinoda | V. Nascimento | R. de Oliveira | Douglas W. F. L. Vilela | E. T. Ferreira | N. V. de Souza Araujo
[1] Wright-Patterson Afb,et al. Feature Selection Using a Multilayer Perceptron , 1990 .
[2] Md. Sohail Ahmad,et al. Short paper: security evaluation of IEEE 802.11w specification , 2011, WiSec '11.
[3] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[4] Mark Handley,et al. The final nail in WEP's coffin , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[5] Nir Friedman,et al. Bayesian Network Classifiers , 1997, Machine Learning.
[6] M. Ravikanth,et al. Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems , 2011 .
[7] Mr T. Kalaikumaran,et al. Feature Selection for Wireless Intrusion Detection System Using Filter and Wrapper Model , 2012 .
[8] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[9] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[10] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[11] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[12] John Mark,et al. Introduction to radial basis function networks , 1996 .
[13] Pan Feng,et al. Wireless LAN security issues and solutions , 2012, 2012 IEEE Symposium on Robotics and Applications (ISRA).
[14] Ron Kohavi,et al. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.
[15] B. B. Meshram,et al. Survey of Attacks on Wireless Network , 2013 .
[16] Khalil El-Khatib,et al. Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems , 2010, IEEE Transactions on Parallel and Distributed Systems.
[17] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[18] Helena Sandström,et al. A survey of the denial of service problem , 2001 .
[19] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[20] John Bell,et al. A review of methods for the assessment of prediction errors in conservation presence/absence models , 1997, Environmental Conservation.