Researching on Multiple Machine Learning for Anomaly Detection
暂无分享,去创建一个
Yuanyuan Sun | Huiping Wang | Shan Jin | Lili Guo | Zhongsong Ma | Yongming Wang | Zhongsong Ma | Lili Guo | Shan Jin | Yuanyuan Sun | Yongming Wang | Huiping Wang
[1] Ray Hunt,et al. Intrusion detection techniques and approaches , 2002, Comput. Commun..
[2] Mohammad Javad Golkar,et al. A hybrid method consisting of GA and SVM for intrusion detection system , 2016, Neural Computing and Applications.
[3] Khaled Elleithy,et al. A majority voting technique for Wireless Intrusion Detection Systems , 2016, 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT).
[4] J. Ross Quinlan,et al. Improved Use of Continuous Attributes in C4.5 , 1996, J. Artif. Intell. Res..
[5] Leo Breiman,et al. Random Forests , 2001, Machine Learning.