Adaptive Intrusion Detection Based on Machine Learning: Feature Extraction, Classifier Construction and Sequential Pattern Prediction
暂无分享,去创建一个
[1] V. Rao Vemuri,et al. Using Text Categorization Techniques for Intrusion Detection , 2002, USENIX Security Symposium.
[2] Xin Xu,et al. A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls , 2005, ICIC.
[3] Salvatore J. Stolfo,et al. Mining Audit Data to Build Intrusion Detection Models , 1998, KDD.
[4] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[5] Yuxin Ding,et al. Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..
[6] John N. Tsitsiklis,et al. Analysis of temporal-difference learning with function approximation , 1996, NIPS 1996.
[7] Ryan M. Rifkin,et al. In Defense of One-Vs-All Classification , 2004, J. Mach. Learn. Res..
[8] John C. Platt,et al. Fast training of support vector machines using sequential minimal optimization, advances in kernel methods , 1999 .
[9] Chih-Jen Lin,et al. Formulations of Support Vector Machines: A Note from an Optimization Point of View , 2001, Neural Computation.
[10] Zied Elouedi,et al. Naive Bayes vs decision trees in intrusion detection systems , 2004, SAC '04.
[11] Risto Miikkulainen,et al. Intrusion Detection with Neural Networks , 1997, NIPS.
[12] Bernhard Pfahringer,et al. Winning the KDD99 classification cup: bagged boosting , 2000, SKDD.
[13] H. He,et al. Efficient Reinforcement Learning Using Recursive Least-Squares Methods , 2011, J. Artif. Intell. Res..
[14] I. Jolliffe. Principal Component Analysis , 2002 .
[15] Susan M. Bridges,et al. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection , 2000 .
[16] Xin Xu,et al. An Adaptive Network Intrusion Detection Method Based on PCA and Support Vector Machines , 2005, ADMA.
[17] Justin A. Boyan,et al. Technical Update: Least-Squares Temporal Difference Learning , 2002, Machine Learning.
[18] TERRAN LANE,et al. Temporal sequence learning and data reduction for anomaly detection , 1999, TSEC.
[19] Richard S. Sutton,et al. Learning to predict by the methods of temporal differences , 1988, Machine Learning.
[20] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[21] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[22] Thomas G. Dietterich,et al. Solving Multiclass Learning Problems via Error-Correcting Output Codes , 1994, J. Artif. Intell. Res..