Feature Selection and Fuzzy Decision Tree for Network Intrusion Detection
暂无分享,去创建一个
[1] Ray Hunt,et al. Intrusion detection techniques and approaches , 2002, Comput. Commun..
[2] Lalitha Rangarajan,et al. Bi-level dimensionality reduction methods using feature selection and feature extraction , 2010 .
[3] Erik D. Goodman,et al. Genetic Algorithm Optimized Feature Transformation - A Comparison with Different Classifiers , 2003, GECCO.
[4] H. Trussell,et al. Constructing membership functions using statistical data , 1986 .
[5] Christopher Krügel,et al. Bayesian event classification for intrusion detection , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[6] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[7] Taeshik Shon,et al. SVM Approach with a Genetic Algorithm for Network Intrusion Detection , 2005, ISCIS.
[8] Erland Jonsson,et al. Anomaly-based intrusion detection: privacy concerns and other problems , 2000, Comput. Networks.
[9] Lotfi A. Zadeh,et al. Fuzzy Sets , 1996, Inf. Control..
[10] K. Saravanan,et al. An Efficient Detection Mechanism for Intrusion Detection Systems Using Rule Learning Method , 2009 .
[11] Rangarajan Lalitha,et al. Multi-Level Dimensionality Reduction Methods Using Feature Selection and Feature Extraction , 2010 .
[12] Julie A. Dickerson,et al. Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).
[13] M. Shyu,et al. A Novel Anomaly Detection Scheme Based on Principal Component Classifier , 2003 .
[14] Jonatan Gómez,et al. Evolving Fuzzy Classifiers for Intrusion Detection , 2002 .
[15] Yuxin Ding,et al. Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..
[16] Alfonso Valdes,et al. Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.
[17] Lucas M. Venter,et al. A comparison of Intrusion Detection systems , 2001, Comput. Secur..