A Novel Fuzzy Anomaly Detection Algorithm Based on Hybrid PSO-Kmeans in Content-Centric Networking
暂无分享,去创建一个
[1] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[2] Abbas Khosravi,et al. Particle swarm optimization for construction of neural network-based prediction intervals , 2014, Neurocomputing.
[3] Andrew P. Bradley,et al. The use of the area under the ROC curve in the evaluation of machine learning algorithms , 1997, Pattern Recognit..
[4] Francesco Palmieri,et al. Network anomaly detection through nonlinear analysis , 2010, Comput. Secur..
[5] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[6] Junyan Chen,et al. HYBRID CLUSTERING ALGORITHM BASED ON PSO WITH THE MULTIDIMENSIONAL ASYNCHRONISM AND STOCHASTIC DISTURBANCE METHOD , 2012 .
[7] Syed Haque,et al. Towards Cyber Defense: Research in Intrusion Detection and Intrusion Prevention Systems , 2010 .
[8] Erwie Zahara,et al. A hybridized approach to data clustering , 2008, Expert Syst. Appl..
[9] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[10] Pekka Nikander,et al. Secure naming in information-centric networks , 2010, ReARCH '10.
[11] Riccardo Poli,et al. Particle swarm optimization , 1995, Swarm Intelligence.
[12] Qiang Wang,et al. A performance evaluation framework for association mining in spatial data , 2010, Journal of Intelligent Information Systems.
[13] Donald W. Bouldin,et al. A Cluster Separation Measure , 1979, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[14] Georgios Kambourakis,et al. Swarm intelligence in intrusion detection: A survey , 2011, Comput. Secur..
[15] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[16] Bengt Ahlgren,et al. A Survey of Information-Centric Networking (Draft) , 2010, Information-Centric Networking.
[17] Kalyanmoy Deb,et al. Boundary Handling Approaches in Particle Swarm Optimization , 2012, BIC-TA.
[18] Ching-Yi Chen,et al. Particle swarm optimization algorithm and its application to clustering analysis , 2004, 2012 Proceedings of 17th Conference on Electrical Power Distribution.
[19] Van Jacobson,et al. Networking named content , 2009, CoNEXT '09.
[20] Mauro Conti,et al. Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking , 2013, 38th Annual IEEE Conference on Local Computer Networks.
[21] Shokri Z. Selim,et al. K-Means-Type Algorithms: A Generalized Convergence Theorem and Characterization of Local Optimality , 1984, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[22] Albert Fornells,et al. Explanations of unsupervised learning clustering applied to data security analysis , 2009, Neurocomputing.
[23] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[24] Manel Guerrero Zapata,et al. A hybrid multiobjective RBF-PSO method for mitigating DoS attacks in Named Data Networking , 2015, Neurocomputing.
[25] Witold Pedrycz,et al. Agreement-based fuzzy C-means for clustering data with blocks of features , 2014, Neurocomputing.
[26] Hai-Tao He,et al. Detecting Anomalous Network Traffic with Combined Fuzzy-Based Approaches , 2005, ICIC.
[27] Anil K. Jain,et al. Data clustering: a review , 1999, CSUR.
[28] Tobias Lauinger,et al. Security & Scalability of Content-Centric Networking , 2010 .
[29] R. Eberhart,et al. Comparing inertia weights and constriction factors in particle swarm optimization , 2000, Proceedings of the 2000 Congress on Evolutionary Computation. CEC00 (Cat. No.00TH8512).
[30] Lizhong Xiao,et al. K-means Algorithm Based on Particle Swarm Optimization Algorithm for Anomaly Intrusion Detection , 2006, 2006 6th World Congress on Intelligent Control and Automation.
[31] Ronnie Johansson,et al. Choosing DBSCAN Parameters Automatically using Differential Evolution , 2014 .
[32] Amin Karami,et al. UTILIZATION AND COMPARISON OF MULTI ATTRIBUTE DECISION MAKING TECHNIQUES TO RANK BAYESIAN NETWORK OPTIONS Master Degree Project in Informatics One year Level ECTS 30 Spring term Year 2011 , 2011 .
[33] Panos Louvieris,et al. Effects-based feature identification for network intrusion detection , 2013, Neurocomputing.
[34] Mehryar Mohri,et al. Confidence Intervals for the Area Under the ROC Curve , 2004, NIPS.
[35] Ajith Abraham,et al. Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..
[36] Alfredo De Santis,et al. Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.
[37] Amin Karami,et al. Data Clustering for Anomaly Detection in Content-Centric Networks , 2013 .
[38] K. alik. An efficient k'-means clustering algorithm , 2008 .
[39] Chen-Chien James Hsu,et al. Enhanced particle swarm optimizer incorporating a weighted particle , 2014, Neurocomputing.
[40] Bartosz Krawczyk,et al. Diversity measures for one-class classifier ensembles , 2014, Neurocomputing.
[41] Wenke Lee,et al. McPAD: A multiple classifier system for accurate payload-based anomaly detection , 2009, Comput. Networks.
[42] Mauro Conti,et al. A lightweight mechanism for detection of cache pollution attacks in Named Data Networking , 2013, Comput. Networks.
[43] Peter J. Rousseeuw,et al. Finding Groups in Data: An Introduction to Cluster Analysis , 1990 .
[44] Ricardo J. G. B. Campello,et al. Evolutionary k-means for distributed data sets , 2014, Neurocomputing.