Design and performance analysis of various feature selection methods for anomaly‐based techniques in intrusion detection system
暂无分享,去创建一个
[1] M Damashek,et al. Gauging Similarity with n-Grams: Language-Independent Categorization of Text , 1995, Science.
[2] Christopher Leckie,et al. A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..
[3] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[4] Bin Liu,et al. A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection , 2006, IEEE Journal on Selected Areas in Communications.
[5] Harish Kumar,et al. An intrusion detection system using network traffic profiling and online sequential extreme learning machine , 2015, Expert Syst. Appl..
[6] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[7] Robert S. Boyer,et al. MJRTY: A Fast Majority Vote Algorithm , 1991, Automated Reasoning: Essays in Honor of Woody Bledsoe.
[8] Reza Azmi,et al. MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach , 2014, Eng. Appl. Artif. Intell..
[9] EMMANOUIL VASILOMANOLAKIS,et al. Taxonomy and Survey of Collaborative Intrusion Detection , 2015, ACM Comput. Surv..
[10] Vladimir Bukhtoyarov,et al. Ensemble-Distributed Approach in Classification Problem Solution for Intrusion Detection Systems , 2014, IDEAL.
[11] Jugal K. Kalita,et al. Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.
[12] Arputharaj Kannan,et al. Decision tree based light weight intrusion detection using a wrapper approach , 2012, Expert Syst. Appl..
[13] Elsayed A. Sallam,et al. A hybrid network intrusion detection framework based on random forests and weighted k-means , 2013 .
[14] Philip K. Chan,et al. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.
[15] Mohammad Zulkernine,et al. Random-Forests-Based Network Intrusion Detection Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[16] Jörg Kindermann,et al. Text Categorization with Support Vector Machines. How to Represent Texts in Input Space? , 2002, Machine Learning.
[17] Alok N. Choudhary,et al. An FPGA-Based Network Intrusion Detection Architecture , 2008, IEEE Transactions on Information Forensics and Security.
[18] Shadi Aljawarneh,et al. Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..
[19] Mamun Bin Ibne Reaz,et al. A novel SVM-kNN-PSO ensemble method for intrusion detection system , 2016, Appl. Soft Comput..
[20] Shi-Jinn Horng,et al. A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..
[21] Quan OuYang. Design and Implementation of Logistics Experiment Platform Based on OMT , 2011 .