Anomaly Detection System Using Beta Mixture Models and Outlier Detection
暂无分享,去创建一个
[1] S. P. Singh,et al. Estimation of Fish Catch Supply Function of Fishing Community in Allahabad (U.P) , 2012 .
[2] Arjun K. Gupta,et al. Handbook of beta distribution and its applications , 2004 .
[3] Jiankun Hu,et al. A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns , 2014, IEEE Transactions on Computers.
[4] Arne Leijon,et al. Beta mixture models and the application to image classification , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[5] Bhupendra Verma,et al. An efficient proactive artificial immune system based anomaly detection and prevention system , 2016, Expert Syst. Appl..
[6] Sharath Chandra Guntuku,et al. Big Data Analytics framework for Peer-to-Peer Botnet detection using Random Forests , 2014, Inf. Sci..
[7] Jugal K. Kalita,et al. Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.
[8] Salvatore Pontarelli,et al. Traffic-Aware Design of a High-Speed FPGA Network Intrusion Detection System , 2013, IEEE Transactions on Computers.
[9] Jill Slay,et al. The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems , 2015, 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).
[10] Jill Slay,et al. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..
[11] Xiangjian He,et al. Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.
[12] Fulvio Gini,et al. An improvement of the state-of-the-art covariance-based methods for statistical anomaly detection algorithms , 2016, Signal Image Video Process..
[13] Quanyan Zhu,et al. Bayesian decision aggregation in collaborative intrusion detection networks , 2010, 2010 IEEE Network Operations and Management Symposium - NOMS 2010.
[14] Mia Hubert,et al. Robust statistics for outlier detection , 2011, WIREs Data Mining Knowl. Discov..
[15] Jill Slay,et al. A hybrid feature selection for network intrusion detection systems: Central points , 2017, ArXiv.
[16] Jill Slay,et al. Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks , 2019, IEEE Transactions on Big Data.
[17] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[18] M. Escobar,et al. Bayesian Density Estimation and Inference Using Mixtures , 1995 .
[19] Xiangjian He,et al. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis , 2014, IEEE Transactions on Parallel and Distributed Systems.
[20] Nizar Bouguila,et al. Unsupervised Anomaly Intrusion Detection via Localized Bayesian Feature Selection , 2011, 2011 IEEE 11th International Conference on Data Mining.