Intrusion Detection System Based on Decision Tree over Big Data in Fog Environment
暂无分享,去创建一个
Victor C. M. Leung | Tao Lin | Shangguang Wang | Chao Huang | Kai Peng | Lixin Zheng | Shangguang Wang | Kai Peng | Lixin Zheng | Tao Lin | Chao Huang
[1] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[2] Shangguang Wang,et al. Bayesian Approach with Maximum Entropy Principle for trusted quality of Web service metric in e-commerce applications , 2012, Secur. Commun. Networks.
[3] Yang Liu,et al. Cloud/Fog Computing System Architecture and Key Technologies for South-North Water Transfer Project Safety , 2018, Wirel. Commun. Mob. Comput..
[4] G. Klas,et al. Fog Computing and Mobile Edge Cloud Gain Momentum Open Fog Consortium, ETSI MEC and Cloudlets , 2015 .
[5] Zhang Hao. An Improved Sequential Minimal Optimization Learning Algorithm for Regression Support Vector Machine , 2003 .
[6] Zied Elouedi,et al. Naive Bayes vs decision trees in intrusion detection systems , 2004, SAC '04.
[7] Jie Zhang,et al. Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds , 2017, Secur. Commun. Networks.
[8] Luis Rodero-Merino,et al. Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.
[9] Wathiq Laftah Al-Yaseen,et al. Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system , 2017, Expert Syst. Appl..
[10] Alberto Maria Segre,et al. Programs for Machine Learning , 1994 .
[11] Samuel Kounev,et al. Evaluating Computer Intrusion Detection Systems , 2015, ACM Comput. Surv..
[12] Dai Tian-hong. Intrusive Detection Based on Genetic Neural Networks , 2006 .
[13] Lu Yu. Research on Abnormal Behavior Detection Based on kNN Algorithm , 2007 .
[14] Peter E. Hart,et al. Nearest neighbor pattern classification , 1967, IEEE Trans. Inf. Theory.
[15] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[16] Ivan Stojmenovic,et al. An overview of Fog computing and its security issues , 2016, Concurr. Comput. Pract. Exp..
[17] Christopher D. Manning,et al. Introduction to Information Retrieval , 2010, J. Assoc. Inf. Sci. Technol..
[18] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[19] Li Yan. A Review and Analysis of Outlier Detection Algorithms , 2002 .
[20] Shao Xiul. The parallel implementation of MapReduce for the Bayesian algorithm to detect botnets , 2014 .
[21] Xuyun Zhang,et al. A balanced virtual machine scheduling method for energy-performance trade-offs in cyber-physical cloud systems , 2017, Future Gener. Comput. Syst..
[22] Robert Tibshirani,et al. Discriminant Adaptive Nearest Neighbor Classification , 1995, IEEE Trans. Pattern Anal. Mach. Intell..
[23] Tom H. Luan,et al. Fog Computing: Focusing on Mobile Users at the Edge , 2015, ArXiv.
[24] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .