A Detailed Analysis of Using Supervised Machine Learning for Intrusion Detection
暂无分享,去创建一个
Ahmed Ahmim | Mohamed Amine Ferrag | Leandros A. Maglaras | Makhlouf Derdour | Helge Janicke | L. Maglaras | H. Janicke | M. Ferrag | M. Derdour | Ahmed Ahmim
[1] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[2] Ian H. Witten,et al. Reduced-error pruning with significance tests , 1999 .
[3] Christopher M. Bishop,et al. Neural networks: a pattern recognition perspective , 1996 .
[4] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .
[5] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[6] William W. Cohen. Fast Effective Rule Induction , 1995, ICML.
[7] J. Platt. Sequential Minimal Optimization : A Fast Algorithm for Training Support Vector Machines , 1998 .
[8] Md Zahidul Islam,et al. Forest PA: Constructing a decision forest by penalizing attributes used in previous trees , 2017, Expert Syst. Appl..
[9] Guido Bugmann,et al. Normalized Gaussian Radial Basis Function networks , 1998, Neurocomputing.
[10] Eyke Hüllermeier,et al. FURIA: an algorithm for unordered fuzzy rule induction , 2009, Data Mining and Knowledge Discovery.
[11] Louis J. Bianco. The inherent weaknesses in industrial control systems devices; hacking and defending SCADA systems , 2016 .
[12] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[13] Leandros A. Maglaras,et al. NIS directive: The case of Greece , 2018, EAI Endorsed Trans. Security Safety.