A Public-Private-Partnership Model for National Cyber Situational Awareness
暂无分享,去创建一个
[1] Carlos Soares,et al. Ranking Learning Algorithms: Using IBL and Meta-Learning on Accuracy and Time Results , 2003, Machine Learning.
[2] Lorien Y. Pratt,et al. A Survey of Connectionist Network Reuse Through Transfer , 1998, Learning to Learn.
[3] Ricardo Vilalta,et al. Introduction to the Special Issue on Meta-Learning , 2004, Machine Learning.
[4] Stefan Arnborg,et al. Information awareness in command and control: precision, quality, utility , 2000, Proceedings of the Third International Conference on Information Fusion.
[5] Salvatore J. Stolfo,et al. On the Accuracy of Meta-learning for Scalable Data Mining , 2004, Journal of Intelligent Information Systems.
[6] Christophe Giraud-Carrier. Beyond predictive accuracy : what? , 1998 .
[7] Paul E. Utgoff,et al. Shift of bias for inductive concept learning , 1984 .
[8] David J. Spiegelhalter,et al. Machine Learning, Neural and Statistical Classification , 2009 .
[9] Donald Perlis,et al. Explicitly biased generalization , 1989, Comput. Intell..
[10] Eric A. M. Luiijf,et al. Nineteen national cyber security strategies , 2013, Int. J. Crit. Infrastructures.
[11] Stephanie S. Barrett,et al. Inter-Organization Information Sharing Systems , 1982, MIS Q..
[12] Robert Engels,et al. Using a Data Metric for Preprocessing Advice for Data Mining Applications , 1998, ECAI.
[13] Rich Caruana,et al. Multitask Learning , 1997, Machine Learning.
[14] M. Pazzani,et al. Error Reduction through Learning Multiple Descriptions , 1996, Machine Learning.
[15] T. Lewis. Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation , 2006 .
[16] So Young Sohn,et al. Meta Analysis of Classification Algorithms for Pattern Recognition , 1999, IEEE Trans. Pattern Anal. Mach. Intell..
[17] Hilan Bensusan,et al. Discovering Task Neighbourhoods Through Landmark Learning Performances , 2000, PKDD.
[18] Abraham Bernstein,et al. An Intelligent Assistant for the Knowledge Discovery Process , 2001, IJCAI 2001.
[19] David B. Skalak,et al. Prototype Selection for Composite Nearest Neighbor Classifiers , 1995 .
[20] Peter A. Flach,et al. Decision tree-based characterization for meta-learning , 2002 .
[21] David W. Aha,et al. Generalizing from Case studies: A Case Study , 1992, ML.
[22] Xiaohua Yan,et al. A Early Detection of Cyber Security Threats using Structured Behavior Modeling , 2013 .
[23] Lukasz Golab,et al. Issues in data stream management , 2003, SGMD.
[24] João Gama,et al. Cascade Generalization , 2000, Machine Learning.
[25] Mica R. Endsley,et al. Theoretical Underpinnings of Situation Awareness, A Critical Review , 2000 .
[26] Yoav Freund,et al. Experiments with a New Boosting Algorithm , 1996, ICML.
[27] J. Costa,et al. A WEIGHTED RANK MEASURE OF CORRELATION , 2005 .
[28] Sebastian Thrun,et al. Lifelong Learning Algorithms , 1998, Learning to Learn.
[29] J. Friedman. Special Invited Paper-Additive logistic regression: A statistical view of boosting , 2000 .
[30] Melanie Hilario,et al. Fusion of Meta-knowledge and Meta-data for Case-Based Model Selection , 2001, PKDD.
[31] Gregory A. Witte,et al. Framework for Improving Critical Infrastructure Cybersecurity | NIST , 2014 .
[32] Mica R. Endsley,et al. Toward a Theory of Situation Awareness in Dynamic Systems , 1995, Hum. Factors.
[33] Dino Pedreschi,et al. Machine Learning: ECML 2004 , 2004, Lecture Notes in Computer Science.
[34] Carlos Soares,et al. Sampling-Based Relative Landmarks: Systematically Test-Driving Algorithms Before Choosing , 2001, EPIA.
[35] George P. Tadda,et al. Overview of Cyber Situation Awareness , 2010, Cyber Situational Awareness.
[36] João Gama,et al. Characterization of Classification Algorithms , 1995, EPIA.
[37] Ricardo Vilalta,et al. A Perspective View and Survey of Meta-Learning , 2002, Artificial Intelligence Review.
[38] Silvana Trimi,et al. Big-data applications in the government sector , 2014, Commun. ACM.
[39] Jürgen Schmidhuber. Discovering Solutions with Low Kolmogorov Complexity and High Generalization Capability , 1995, ICML.
[40] Takahira Yamaguchi,et al. Constructing Inductive Applications by Meta-Learning with Method Repositories , 2002, Progress in Discovery Science.
[41] Saso Dzeroski,et al. Combining Classifiers with Meta Decision Trees , 2003, Machine Learning.
[42] Ian H. Witten,et al. Stacked generalization: when does it work? , 1997, IJCAI 1997.
[43] Ian S. Paterson. New Models for Data Envelopment Analysis. Measuring Efficiency Outwith the VRS Frontier , 2000 .
[44] Robert Tibshirani,et al. The Elements of Statistical Learning: Data Mining, Inference, and Prediction, 2nd Edition , 2001, Springer Series in Statistics.
[45] Carla E. Brodley,et al. Recursive automatic bias selection for classifier construction , 1995, Machine Learning.
[46] Ulrik Franke,et al. Cyber situational awareness - A systematic review of the literature , 2014, Comput. Secur..
[47] Hilan Bensusan,et al. A Higher-order Approach to Meta-learning , 2000, ILP Work-in-progress reports.
[48] L. Breiman. Stacked Regressions , 1996, Machine Learning.
[49] Alexander Schnabl,et al. Development of Multi-Criteria Metrics for Evaluation of Data Mining Algorithms , 1997, KDD.
[50] Gerhard Widmer,et al. Tracking Context Changes through Meta-Learning , 1997, Machine Learning.
[51] Hilan Bensusan,et al. Meta-Learning by Landmarking Various Learning Algorithms , 2000, ICML.
[52] Marie desJardins,et al. Evaluation and selection of biases in machine learning , 1995, Machine Learning.
[53] Katharina Morik,et al. The MiningMart Approach to Knowledge Discovery in Databases , 2004 .
[54] Florian Skopik,et al. Designing a Cyber Attack Information System for National Situational Awareness , 2012, Future Security.
[55] Bernard Zenko,et al. Is Combining Classifiers Better than Selecting the Best One , 2002, ICML.
[56] Pavel Brazdil,et al. Improving Progressive Sampling via Meta-learning on Learning Curves , 2004, ECML.
[57] Christopher J. Merz,et al. Dynamical Selection of Learning Algorithms , 1995, AISTATS.
[58] Jonathan Baxter,et al. Theoretical Models of Learning to Learn , 1998, Learning to Learn.
[59] James Moffat. Mathematical modelling of information age conflict , 2006, Adv. Decis. Sci..
[60] P. Andersen,et al. A procedure for ranking efficient units in data envelopment analysis , 1993 .
[61] Johannes Fürnkranz,et al. An Evaluation of Landmarking Variants , 2001 .