A novel technique for converting nominal attributes to numeric attributes for intrusion detection
暂无分享,去创建一个
[1] Kangfeng Zheng,et al. Intrusion detection algorithm based on density, cluster centers, and nearest neighbors , 2016, China Communications.
[2] Tawfiq S. Barhoom,et al. Network Intrusion Detection Using Semi- Supervised Learning Based on Normal Behaviour's Standard Deviation , 2015 .
[3] E. A. Mary Anita,et al. Heuristic Approach of Supervised Learning for Intrusion Detection , 2014 .
[4] Yasmen Wahba,et al. Improving the Performance of Multi-class Intrusion Detection Systems using Feature Reduction , 2015, ArXiv.
[6] Snehal A. Mulay,et al. Intrusion Detection System using Support Vector Machine and Decision Tree , 2010 .
[7] Mei-Ling Shyu,et al. Handling nominal features in anomaly intrusion detection problems , 2005, 15th International Workshop on Research Issues in Data Engineering: Stream Data Mining and Applications (RIDE-SDMA'05).
[8] B. Muthukumar,et al. Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach , 2015 .
[9] Kapil Wankhade,et al. Intrusion Detection System Using New Ensemble Boosting Approach , 2012 .
[10] Francisco Herrera,et al. Data Preprocessing in Data Mining , 2014, Intelligent Systems Reference Library.
[11] Bhawna Nigam,et al. Network Intrusion Detection using Semi Supervised Support Vector Machine , 2014 .
[12] Z. Kouba,et al. Data pre-processing support for data mining , 2002, IEEE International Conference on Systems, Man and Cybernetics.
[13] Sapna Malik,et al. Anomaly based Intrusion Detection in Android Mobiles: A Review , 2019 .
[14] Shahram Sarkani,et al. A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier , 2012, Expert Syst. Appl..
[15] Balachandra Muniyal,et al. Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection , 2016 .
[16] Swati Paliwal,et al. Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm , 2012 .
[17] Sameer Dixit,et al. An Implementation of Data Pre-Processing for Small Dataset , 2014 .
[18] Yongzhong Li,et al. An Intrusion Detection Algorithm Based on Multi-label Learning , 2022 .
[19] Xiangjian He,et al. Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.
[20] Kumar Jain Yogendra. Intrusion Detection using Supervised Learning with Feature Set Reduction , 2011 .
[21] M. Hemalatha,et al. Effective approach toward Intrusion Detection System using data mining techniques , 2014 .
[22] Puja Padiya,et al. Intrusion detection system by improved preprocessing methods and Naïve Bayes classifier using NSL-KDD 99 Dataset , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).
[23] Chi Cheng,et al. Extreme learning machines for intrusion detection , 2012, The 2012 International Joint Conference on Neural Networks (IJCNN).
[24] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[25] Wei Hu,et al. AdaBoost-Based Algorithm for Network Intrusion Detection , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[26] B. Surendiran,et al. Dimensionality reduction using Principal Component Analysis for network intrusion detection , 2016 .