Adaboost Ensemble with Genetic Algorithm Post Optimization for Intrusion Detection
暂无分享,去创建一个
[1] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[2] Leo Breiman,et al. Classification and Regression Trees , 1984 .
[3] Yoav Freund,et al. Experiments with a New Boosting Algorithm , 1996, ICML.
[4] Stan Z. Li,et al. Real-time multi-view face detection , 2002, Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition.
[5] Wei Tang,et al. Ensembling neural networks: Many could be better than all , 2002, Artif. Intell..
[6] Manas Ranjan Patra,et al. NETWORK INTRUSION DETECTION USING NAÏVE BAYES , 2007 .
[7] Octavio Nieto-Taladriz,et al. Improving network security using genetic algorithm approach , 2007, Comput. Electr. Eng..
[8] Wei Hu,et al. AdaBoost-Based Algorithm for Network Intrusion Detection , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[9] Gouda I. Salama,et al. Performance Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System , 2009 .
[10] Ian Stewart,et al. A Modified Genetic Algorithm and Switch-Based Neural Network Model Applied to Misuse-Based Intrusion Detection , 2009 .
[11] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[12] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[13] Manas Ranjan Patra,et al. Discriminative multinomial Naïve Bayes for network intrusion detection , 2010, 2010 Sixth International Conference on Information Assurance and Security.
[14] Hongle Du,et al. A Cooperative Network Intrusion detection Based on Fuzzy SVMs , 2010, J. Networks.
[15] Wei-Yin Loh,et al. Classification and regression trees , 2011, WIREs Data Mining Knowl. Discov..
[16] Hany M. Harb,et al. Selecting Optimal Subset of Features for Intrusion Detection Systems , 2011 .