Adaptive and online network intrusion detection system using clustering and Extreme Learning Machines
暂无分享,去创建一个
Amaury Lendasse | Anton Akusok | Yoan Miché | Setareh Roshan | Y. Miché | A. Lendasse | S. Roshan | Anton Akusok
[1] Guang-Bin Huang,et al. Extreme learning machine: a new learning scheme of feedforward neural networks , 2004, 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541).
[2] Narasimhan Sundararajan,et al. A Fast and Accurate Online Sequential Learning Algorithm for Feedforward Networks , 2006, IEEE Transactions on Neural Networks.
[3] C. D. Meyer,et al. Generalized inverses of linear transformations , 1979 .
[4] J. J. Moré,et al. Levenberg--Marquardt algorithm: implementation and theory , 1977 .
[5] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[6] David Zhang,et al. Robust Visual Knowledge Transfer via Extreme Learning Machine-Based Domain Adaptation , 2016, IEEE Transactions on Image Processing.
[7] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[8] K. S. Banerjee. Generalized Inverse of Matrices and Its Applications , 1973 .
[9] Chee Kheong Siew,et al. Extreme learning machine: Theory and applications , 2006, Neurocomputing.
[10] Amaury Lendasse,et al. OP-ELM: Optimally Pruned Extreme Learning Machine , 2010, IEEE Transactions on Neural Networks.
[11] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[12] Di Guo,et al. Extreme Kernel Sparse Learning for Tactile Object Recognition , 2017, IEEE Transactions on Cybernetics.
[13] Khaled Labib. Computer security and intrusion detection , 2004, CROS.
[14] Ron Kohavi,et al. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.
[15] Fuchun Sun,et al. Visual–Tactile Fusion for Object Recognition , 2017, IEEE Transactions on Automation Science and Engineering.
[16] Yaonan Wang,et al. Data Partition Learning With Multiple Extreme Learning Machines , 2015, IEEE Transactions on Cybernetics.
[17] V. V. Gubkina,et al. Intrusion Prevention and Intrusion Detection Systems , 2013 .
[18] Amaury Lendasse,et al. SOM-ELM - Self-Organized Clustering using ELM , 2015, Neurocomputing.
[19] Tsuyoshi Murata,et al. {m , 1934, ACML.
[20] Gene H. Golub,et al. Matrix computations , 1983 .
[21] Rituparna Chaki,et al. Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .
[22] Amaury Lendasse,et al. TROP-ELM: A double-regularized ELM using LARS and Tikhonov regularization , 2011, Neurocomputing.
[23] S. Forrest,et al. A History and Survey of Network Firewalls , 2014 .
[24] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[25] Chee Kheong Siew,et al. Universal Approximation using Incremental Constructive Feedforward Networks with Random Hidden Nodes , 2006, IEEE Transactions on Neural Networks.
[26] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[27] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[28] C. R. Rao,et al. Generalized Inverse of Matrices and its Applications , 1972 .
[29] Erkki Oja,et al. GPU-accelerated and parallelized ELM ensembles for large-scale regression , 2011, Neurocomputing.
[30] David Zhang,et al. Domain Adaptation Extreme Learning Machines for Drift Compensation in E-Nose Systems , 2015, IEEE Transactions on Instrumentation and Measurement.
[31] Minxia Luo,et al. Ensemble extreme learning machine and sparse representation classification , 2016, J. Frankl. Inst..