Enhancing Wireless Intrusion Detection Using Machine Learning Classification with Reduced Attribute Sets
暂无分享,去创建一个
Miad Faezipour | Razan Abdulhammed | Abdelshakour A. Abuzneid | Ali Alessa | M. Faezipour | Razan Abdulhammed | Ali Alessa | A. Abuzneid
[1] Qiang Shen,et al. Feature Selection With Harmony Search , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[2] Kwangjo Kim,et al. Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection , 2018, IEEE Transactions on Information Forensics and Security.
[3] Georgios Kambourakis,et al. Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.
[4] Ken Ferens,et al. A Cognitive Multi-agent Model to Detect Malicious Threats , 2017 .
[5] Mark Goadrich,et al. The relationship between Precision-Recall and ROC curves , 2006, ICML.
[6] Lei Xu,et al. Best first strategy for feature selection , 1988, [1988 Proceedings] 9th International Conference on Pattern Recognition.
[7] Neelam Sharma,et al. INTRUSION DETECTION USING NAIVE BAYES CLASSIFIER WITH FEATURE REDUCTION , 2012 .
[8] Miriya Thanthrige,et al. Hidden Markov Model Based Intrusion Alert Prediction , 2016 .
[9] J. Friedman. Special Invited Paper-Additive logistic regression: A statistical view of boosting , 2000 .
[10] Shailendra Sahu,et al. Network intrusion detection system using J48 Decision Tree , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[11] Vrizlynn L. L. Thing,et al. IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).
[12] Mark A. Hall,et al. Correlation-based Feature Selection for Machine Learning , 2003 .
[13] Trevor Hastie,et al. Additive Logistic Regression : a Statistical , 1998 .
[14] 김광조,et al. Detecting Active Attacks in WiFi Network by Semi-supervised Deep Learning , 2016 .
[15] Pedro M. Domingos. MetaCost: a general method for making classifiers cost-sensitive , 1999, KDD '99.
[16] Jiujun Cheng,et al. Research on the Matthews Correlation Coefficients Metrics of Personalized Recommendation Algorithm Evaluation , 2015 .
[17] Kwangjo Kim,et al. Weighted Feature Selection Techniques for Detecting Impersonation Attack in Wi-Fi Networks , 2016 .
[18] Xianbin Wang,et al. Machine learning techniques for intrusion detection on public dataset , 2016, 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).