Real-time anomaly detection using parallelized intrusion detection architecture for streaming data
暂无分享,去创建一个
[1] Dong Seong Kim,et al. Network-Based Intrusion Detection with Support Vector Machines , 2003, ICOIN.
[2] Minxia Luo,et al. Ensemble extreme learning machine and sparse representation classification , 2016, J. Frankl. Inst..
[3] Yinhui Li,et al. An efficient intrusion detection system based on support vector machines and gradually feature removal method , 2012, Expert Syst. Appl..
[4] Atta Badii,et al. Real-time feature selection technique with concept drift detection using adaptive micro-clusters for data stream mining , 2018, Knowl. Based Syst..
[5] Neeraj Kumar,et al. A feature reduced intrusion detection system using ANN classifier , 2017, Expert Syst. Appl..
[6] Omar Y. Al-Jarrah,et al. Semi-supervised multi-layered clustering model for intrusion detection , 2017, Digit. Commun. Networks.
[7] Wee Keong Ng,et al. Learning under concept drift with follow the regularized leader and adaptive decaying proximal , 2018, Expert Syst. Appl..
[8] Bin Luo,et al. A novel intrusion detection system based on feature generation with visualization strategy , 2014, Expert Syst. Appl..
[9] Luiz Eduardo Soares de Oliveira,et al. Toward a reliable anomaly-based intrusion detection in real-world environments , 2017, Comput. Networks.
[10] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[11] Marley M. B. R. Vellasco,et al. DetectA: abrupt concept drift detection in non-stationary environments , 2018, Appl. Soft Comput..
[12] Di Guo,et al. Extreme Kernel Sparse Learning for Tactile Object Recognition , 2017, IEEE Transactions on Cybernetics.
[13] Kwangjo Kim,et al. Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection , 2016, IEEE Transactions on Cybernetics.
[14] U. Srinivasulu Reddy,et al. Cost-sensitive Risk Induced Bayesian Inference Bagging (RIBIB) for credit card fraud detection , 2018, J. Comput. Sci..
[15] Seyed Mojtaba Hosseini Bamakan,et al. An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization , 2016, Neurocomputing.
[16] Stefan C. Kremer,et al. Network intrusion detection system based on recursive feature addition and bigram technique , 2018, Comput. Secur..
[17] Luiz Eduardo Soares de Oliveira,et al. Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine for Embedded Systems , 2017, IEEE Transactions on Computers.
[18] Qi Fang,et al. A Semi-supervised Intrusion Detection Algorithm Based on Natural Neighbor , 2016, 2016 International Conference on Information System and Artificial Intelligence (ISAI).
[19] Chih-Fong Tsai,et al. CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..
[20] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[21] Maria Papadaki,et al. A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm , 2010, Comput. Secur..
[22] Shi-Jinn Horng,et al. A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..
[23] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[24] Harish Kumar,et al. An intrusion detection system using network traffic profiling and online sequential extreme learning machine , 2015, Expert Syst. Appl..
[25] Kwangjo Kim,et al. Machine-Learning-Based Feature Selection Techniques for Large-Scale Network Intrusion Detection , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW).
[26] David Zhang,et al. Robust Visual Knowledge Transfer via Extreme Learning Machine-Based Domain Adaptation , 2016, IEEE Transactions on Image Processing.
[27] Sameer Singh,et al. Novelty detection: a review - part 1: statistical approaches , 2003, Signal Process..
[28] Dong Hyun Jeong,et al. A multi-level intrusion detection method for abnormal network behaviors , 2016, J. Netw. Comput. Appl..
[29] Yu-Lin He,et al. Fuzziness based semi-supervised learning approach for intrusion detection system , 2017, Inf. Sci..
[30] Amaury Lendasse,et al. Adaptive and online network intrusion detection system using clustering and Extreme Learning Machines , 2017, J. Frankl. Inst..
[31] Zahid Anwar,et al. A fast and scalable technique for constructing multicast routing trees with optimized quality of service using a firefly based genetic algorithm , 2014, Multimedia Tools and Applications.
[32] Jie Gu,et al. An effective intrusion detection framework based on SVM with feature augmentation , 2017, Knowl. Based Syst..