Decision Tree and Genetic Algorithm Based Intrusion Detection System
暂无分享,去创建一个
[1] María José del Jesús,et al. KEEL: a software tool to assess evolutionary algorithms for data mining problems , 2008, Soft Comput..
[2] Vijay Kumar Jha,et al. Data Mining in Intrusion Detection: A Comparative Study of Methods, Types and Data Sets , 2013 .
[3] Andrew J. Clark,et al. Data preprocessing for anomaly based network intrusion detection: A review , 2011, Comput. Secur..
[4] Cungen Cao,et al. An incremental decision tree algorithm based on rough sets and its application in intrusion detection , 2011, Artificial Intelligence Review.
[5] Shingo Mabu,et al. An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[6] Gulshan Kumar,et al. The use of artificial intelligence based techniques for intrusion detection: a review , 2010, Artificial Intelligence Review.
[7] Snehal A. Mulay,et al. Intrusion Detection System using Support Vector Machine and Decision Tree , 2010 .
[8] Shu-Hsien Liao,et al. Data mining techniques and applications - A decade review from 2000 to 2011 , 2012, Expert Syst. Appl..
[9] Deborah R. Carvalho,et al. A Genetic Algorithm-Based Solution for the Problem of Small Disjuncts , 2000, PKDD.
[10] Vijay Kumar Jha,et al. A Novel Fuzzy Min-Max Neural Network and Genetic Algorithm-Based Intrusion Detection System , 2016 .
[11] Wei Fan,et al. Mining big data: current status, and forecast to the future , 2013, SKDD.
[12] Gisung Kim,et al. A novel hybrid intrusion detection method integrating anomaly detection with misuse detection , 2014, Expert Syst. Appl..
[13] Julie Greensmith,et al. Immune system approaches to intrusion detection – a review , 2004, Natural Computing.
[14] Arputharaj Kannan,et al. An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm , 2008, Int. J. Commun. Netw. Syst. Sci..
[15] Vijay Kumar Jha,et al. Fuzzy min–max neural network and particle swarm optimization based intrusion detection system , 2017 .
[16] Taeshik Shon,et al. A hybrid machine learning approach to network anomaly detection , 2007, Inf. Sci..
[17] Amutha Prabakar Muniyandi,et al. Network Anomaly Detection by Cascading K-Means Clustering and C4.5 Decision Tree algorithm , 2012 .
[18] A. El-Semary,et al. Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection , 2006, 2006 IEEE Information Assurance Workshop.
[19] Sujatha Srinivasan,et al. Intelligent agent based artificial immune system for computer security—a review , 2009, Artificial Intelligence Review.
[20] Udo W. Pooch,et al. Adaptation techniques for intrusion detection and intrusion response systems , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[21] Klaus Julisch,et al. Data Mining for Intrusion Detection , 2002, Applications of Data Mining in Computer Security.
[22] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[23] Bhavani M. Thuraisingham,et al. A new intrusion detection system using support vector machines and hierarchical clustering , 2007, The VLDB Journal.
[24] Monark Bag,et al. Cascading of C4.5 Decision Tree and Support Vector Machine for Rule Based Intrusion Detection System , 2012 .
[25] S. Saravan Kumar,et al. An Intelligent Intrusion Detection System Using Average Manhattan Distance-based Decision Tree , 2015 .
[26] Ramakrishnan Srikant,et al. Fast algorithms for mining association rules , 1998, VLDB 1998.
[27] Vijay Kumar Jha,et al. Data Mining based Hybrid Intrusion Detection System , 2014 .
[28] Hesham Altwaijry,et al. Bayesian based intrusion detection system , 2012, J. King Saud Univ. Comput. Inf. Sci..
[29] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[30] Deborah R. Carvalho,et al. A hybrid decision tree/genetic algorithm for coping with the problem of small disjuncts in data mining , 2000, GECCO.
[31] A. Kannan,et al. An intelligent intrusion detection system using genetic based feature selection and Modified J48 decision tree classifier , 2013, 2013 Fifth International Conference on Advanced Computing (ICoAC).
[32] Guangjie Han,et al. IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks , 2013, IET Inf. Secur..
[33] Vijay Kumar Jha,et al. Genetic Algorithm to Solve the Problem of Small Disjunct In the Decision Tree Based Intrusion Detection System , 2015 .
[34] Manas Ranjan Patra,et al. A Hybrid Intelligent Approach for Network Intrusion Detection , 2012 .
[35] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[36] Arputharaj Kannan,et al. Decision tree based light weight intrusion detection using a wrapper approach , 2012, Expert Syst. Appl..
[37] Robert C. Holte,et al. Concept Learning and the Problem of Small Disjuncts , 1989, IJCAI.
[38] Deborah R. Carvalho,et al. A genetic-algorithm for discovering small-disjunct rules in data mining , 2002, Appl. Soft Comput..
[39] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[40] Deborah R. Carvalho,et al. A Genetic Algorithm With Sequential Niching For Discovering Small-disjunct Rules , 2002, GECCO.