An Improved Bat Algorithm Driven by Support Vector Machines for Intrusion Detection
暂无分享,去创建一个
[1] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[2] Victor Valeriu Patriciu,et al. Intrusions detection based on Support Vector Machine optimized with swarm intelligence , 2014, 2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI).
[3] Nadjet Kamel,et al. A Hybrid Bat Based Feature Selection Approach for Intrusion Detection , 2014, BIC-TA.
[4] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[5] Slobodan Petrovic,et al. Improving Effectiveness of Intrusion Detection by Correlation Feature Selection , 2010, ARES.
[6] Geoffrey I. Webb,et al. Encyclopedia of Machine Learning , 2011, Encyclopedia of Machine Learning.
[7] Xingwei Liu,et al. A New Intrusion Detection Method Based on BPSO-SVM , 2008, 2008 International Symposium on Computational Intelligence and Design.
[8] Xin-She Yang,et al. A New Metaheuristic Bat-Inspired Algorithm , 2010, NICSO.
[9] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[10] Hui-Hua Yang,et al. Ant colony optimization based network intrusion feature selection and detection , 2005, 2005 International Conference on Machine Learning and Cybernetics.
[11] Zbigniew Kotulski,et al. New Unknown Attack Detection with the Neural Network–Based IDS , 2014 .
[12] Xin-She Yang,et al. BBA: A Binary Bat Algorithm for Feature Selection , 2012, 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images.
[13] Valentin Sgarciu,et al. Enhanced intrusion detection system based on bat algorithm-support vector machine , 2014, 2014 11th International Conference on Security and Cryptography (SECRYPT).
[14] Xin-She Yang,et al. Bat algorithm: literature review and applications , 2013, Int. J. Bio Inspired Comput..
[15] Xin-She Yang,et al. Firefly Algorithms for Multimodal Optimization , 2009, SAGA.
[16] Xu Hong,et al. A Real-time Intrusion Detection System Based on PSO-SVM , 2009 .
[17] Jun Wang,et al. A real time IDSs based on artificial Bee Colony-support vector machine algorithm , 2010, Third International Workshop on Advanced Computational Intelligence.