Vector Based Genetic Algorithm to optimize predictive analysis in network security
暂无分享,去创建一个
Sohail Asghar | Masoom Alam | Sidra Ijaz | Faheel A. Hashmi | S. Asghar | Masoom Alam | S. Ijaz | Faheel A. Hashmi
[1] Emma Ireland,et al. Intrusion Detection with Genetic Algorithms and Fuzzy Logic , 2013 .
[2] N. Wattanapongsakorn,et al. Real-time intrusion detection with fuzzy genetic algorithm , 2013, 2013 10th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.
[3] Václav Snásel,et al. Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.
[4] Aboul Ella Hassanien,et al. Genetic algorithm with different feature selection techniques for anomaly detectors generation , 2013, 2013 Federated Conference on Computer Science and Information Systems.
[5] Dong Seong Kim,et al. Fusions of GA and SVM for Anomaly Detection in Intrusion Detection System , 2005, ISNN.
[6] Julie Greensmith,et al. Sensing Danger: Innate Immunology for Intrusion Detection , 2007, Inf. Secur. Tech. Rep..
[7] Hari Om,et al. A hybrid system for reducing the false alarm rate of anomaly intrusion detection system , 2012, 2012 1st International Conference on Recent Advances in Information Technology (RAIT).
[8] Amin Dastanpour,et al. Using Genetic Algorithm to Supporting Artificial Neural Network for Intrusion Detection System , 2014 .
[9] Philip K. Chan,et al. Machine Learning for Computer Security , 2006, J. Mach. Learn. Res..
[10] K. G. Srinivasa,et al. Application of Genetic Algorithms for Detecting Anomaly in Network Intrusion Detection Systems , 2012 .
[11] Sam Kwong,et al. Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection , 2007, Pattern Recognition.
[12] F. Azuaje. Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .
[13] Roshani Gaidhane,et al. Survey: Learning Techniques for Intrusion Detection System (IDS) , 2014 .
[14] Darrell Whitley,et al. A genetic algorithm tutorial , 1994, Statistics and Computing.
[15] Ahmed Patel,et al. A survey of intrusion detection and prevention systems , 2010, Inf. Manag. Comput. Secur..
[16] Octavio Nieto-Taladriz,et al. Improving network security using genetic algorithm approach , 2007, Comput. Electr. Eng..
[17] Kien A. Hua,et al. Decision tree classifier for network intrusion detection with GA-based feature selection , 2005, ACM Southeast Regional Conference.
[18] Ali A. Ghorbani,et al. Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection , 2007, Fifth Annual Conference on Communication Networks and Services Research (CNSR '07).
[19] Samidha Dwivedi Sharma,et al. Improved Algorithm for Intrusion Detection Using Genetic Algorithm and SNORT , 2014 .
[20] John Gantz,et al. The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East , 2012 .
[21] Uwe Aickelin,et al. Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.
[22] Nasser Yazdani,et al. Mutual information-based feature selection for intrusion detection systems , 2011, J. Netw. Comput. Appl..
[23] Salvatore J. Stolfo,et al. Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[24] Lawrence. Davis,et al. Handbook Of Genetic Algorithms , 1990 .
[25] Mohammad Javad Golkar,et al. A hybrid method consisting of GA and SVM for intrusion detection system , 2016, Neural Computing and Applications.
[26] D. Dasgupta,et al. Immunity-based systems: a survey , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.
[27] Ritu Nagpal,et al. Intrusion Detection System Using Genetic Algorithm-A Review , 2012 .
[28] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[29] Ayush Sharma,et al. Genetic Algorithm Based Feature Selection Algorithm for Effective Intrusion Detection in Cloud Networks , 2012, 2012 IEEE 12th International Conference on Data Mining Workshops.
[30] R. Remya,et al. A hybrid method based on genetic algorithm, self-organised feature map, and support vector machine for better network anomaly detection , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[31] Julie Greensmith,et al. Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.
[32] Paul A. Watters,et al. Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures , 2011, AusDM.
[33] Md. Abu Naser Bikas,et al. An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.
[34] Feng Wang,et al. A Survey of Artificial Immune System Based Intrusion Detection , 2014, TheScientificWorldJournal.
[36] Wei Li,et al. Using Genetic Algorithm for Network Intrusion Detection , 2004 .
[37] Natarajan Meghanathan,et al. Advances in Computer Science and Information Technology. Networks and Communications , 2012, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
[38] Lalit M. Patnaik,et al. Genetic algorithms: a survey , 1994, Computer.
[39] Liu Hean,et al. Research on False Alarm Rate of Intrusion Detection based on Cloning Immune Method , 2013 .
[40] Alejandro Zunino,et al. An empirical comparison of botnet detection methods , 2014, Comput. Secur..