A Deterministic Crowding Evolutionary Algorithm for Optimization of a KNN-based Anomaly Intrusion Detection System
暂无分享,去创建一个
[1] Richard O. Duda,et al. Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.
[2] Ben Paechter,et al. PSFGA : Parallel processing and evolutionary computation for multiobjective optimisation , 2004 .
[3] David J. Hand,et al. Discrimination and Classification , 1982 .
[4] Samir W. Mahfoud. A Comparison of Parallel and Sequential Niching Methods , 1995, ICGA.
[5] Bruno Sareni,et al. Fitness sharing and niching methods revisited , 1998, IEEE Trans. Evol. Comput..
[6] P. John Clarkson,et al. Erratum: A Species Conserving Genetic Algorithm for Multimodal Function Optimization , 2003, Evolutionary Computation.
[7] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[8] Hiroshi Motoda,et al. Feature Selection for Knowledge Discovery and Data Mining , 1998, The Springer International Series in Engineering and Computer Science.
[9] Gürsel Serpen,et al. Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context , 2003, MLMTA.
[10] Itzhak Levin,et al. KDD-99 classifier learning contest LLSoft's results overview , 2000, SKDD.
[11] Salvatore J. Stolfo,et al. Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[12] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[13] Alain Pétrowski,et al. A clearing procedure as a niching method for genetic algorithms , 1996, Proceedings of IEEE International Conference on Evolutionary Computation.
[14] A. E. Eiben,et al. Introduction to Evolutionary Computing , 2003, Natural Computing Series.