Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection
暂无分享,去创建一个
Abdallah Shami | Ali Bou Nassif | Aleksander Essex | Fadi Salo | MohammadNoor Injadat | F. Salo | A. B. Nassif | A. Essex | A. Shami | M. Injadat
[1] Seyed Mojtaba Hosseini Bamakan,et al. A New Intrusion Detection Approach Using PSO based Multiple Criteria Linear Programming , 2015, ITQM.
[2] Nando de Freitas,et al. A Tutorial on Bayesian Optimization of Expensive Cost Functions, with Application to Active User Modeling and Hierarchical Reinforcement Learning , 2010, ArXiv.
[3] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[4] Hao Yu,et al. Work-in-progress: a fast online sequential learning accelerator for IoT network intrusion detection , 2017, 2017 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
[5] Mohammad Zulkernine,et al. Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection , 2006, 2006 IEEE International Conference on Communications.
[6] Farrukh Aslam Khan,et al. Binary PSO and random forests algorithm for PROBE attacks detection in a network , 2011, 2011 IEEE Congress of Evolutionary Computation (CEC).
[7] Nur Izura Udzir,et al. Anomaly-based intrusion detection through K-means clustering and naives bayes classification , 2013 .
[8] Wenjuan Li,et al. Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection , 2015, Secur. Commun. Networks.
[9] Shadi Aljawarneh,et al. Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..
[10] Adel Sabry Eesa,et al. A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems , 2015, Expert Syst. Appl..
[11] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[12] Shan Suthaharan,et al. Big data classification: problems and challenges in network intrusion prediction with machine learning , 2014, PERV.
[13] Mohammad Zulkernine,et al. Random-Forests-Based Network Intrusion Detection Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[14] T. Mak,et al. Evaluation of three rapid oral fluid test devices on the screening of multiple drugs of abuse including ketamine. , 2018, Forensic science international.
[15] Ali Bou Nassif,et al. Data mining techniques in social media: A survey , 2016, Neurocomputing.
[16] Yue Wu,et al. A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network , 2014, J. Electr. Comput. Eng..
[17] Siyang Zhang,et al. A novel hybrid KPCA and SVM with GA model for intrusion detection , 2014, Appl. Soft Comput..
[18] Mansour Sheikhan,et al. Modification of supervised OPF-based intrusion detection systems using unsupervised learning and social network concept , 2017, Pattern Recognit..
[19] Farrukh Aslam Khan,et al. A Hybrid Technique Using Multi-objective Particle Swarm Optimization and Random Forests for PROBE Attacks Detection in a Network , 2013, 2013 IEEE International Conference on Systems, Man, and Cybernetics.
[20] Cherukuri Aswani Kumar,et al. Intrusion detection model using fusion of chi-square feature selection and multi class SVM , 2017, J. King Saud Univ. Comput. Inf. Sci..
[21] Anne E. James,et al. Improving network intrusion detection system performance through quality of service configuration and parallel technology , 2015, J. Comput. Syst. Sci..
[22] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[23] Noorhaniza Wahid,et al. A hybrid network intrusion detection system using simplified swarm optimization (SSO) , 2012, Appl. Soft Comput..
[24] Malek Ben Salem,et al. A Survey of Insider Attack Detection Research , 2008, Insider Attack and Cyber Security.
[25] Maher Salem,et al. Mining Techniques in Network Security to Enhance Intrusion Detection Systems , 2012, ArXiv.
[26] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..