A Hybrid RBF-SVM Ensemble Approach for Data Mining Applications
暂无分享,去创建一个
[1] Nissan Levin,et al. Issues and problems in applying neural computing to target marketing , 1997 .
[2] Adnan Amin,et al. Hand-printed arabic character recognition system using an artificial network , 1996, Pattern Recognit..
[3] Joao M. C. Sousa,et al. Comparison of target selection methods in direct marketing , 2002 .
[4] Tang Zaiyong. Improving Direct Marketing Profitability with Neural Networks , 2011 .
[5] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[6] Ray Hunt,et al. Intrusion detection techniques and approaches , 2002, Comput. Commun..
[7] Majid Ahmadi,et al. Recognition of handwritten numerals with multiple feature and multistage classifier , 1995, Pattern Recognit..
[8] Leo Breiman,et al. Bias, Variance , And Arcing Classifiers , 1996 .
[9] Stan Matwin,et al. Learning When Negative Examples Abound , 1997, ECML.
[10] Arthur B. Maccabe,et al. The architecture of a network level intrusion detection system , 1990 .
[11] Maryam Daneshmandi mdaneshmandi. A Hybrid Data Mining Model to Improve Customer Response Modeling in Direct Marketing , 2012 .
[12] Guadalupe I. Janoski,et al. Intrusion Detection : Support Vector Machines and Neural Networks , 2002 .
[13] Erland Jonsson,et al. Anomaly-based intrusion detection: privacy concerns and other problems , 2000, Comput. Networks.
[14] Ching Y. Suen,et al. Computer recognition of unconstrained handwritten numerals , 1992, Proc. IEEE.
[15] Bernhard Schölkopf,et al. Improving the Accuracy and Speed of Support Vector Machines , 1996, NIPS.
[16] Aurobindo Sundaram,et al. An introduction to intrusion detection , 1996, CROS.
[17] M. Govindarajan. Intrusion Detection using an Ensemble of Classification Methods , 2012 .
[18] Yoav Freund,et al. A decision-theoretic generalization of on-line learning and an application to boosting , 1995, EuroCOLT.
[19] Ajith Abraham,et al. Intrusion Detection Using Ensemble of Soft Computing Paradigms , 2003 .
[20] Yoav Freund,et al. Experiments with a New Boosting Algorithm , 1996, ICML.
[21] Adam Krzyżak,et al. Methods of combining multiple classifiers and their applications to handwriting recognition , 1992, IEEE Trans. Syst. Man Cybern..
[22] Ching Y. Suen,et al. Optimal combinations of pattern classifiers , 1995, Pattern Recognit. Lett..
[23] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[24] Sunil Gupta,et al. Valuing customers , 2007 .
[25] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[26] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[27] Robert Tibshirani,et al. The Elements of Statistical Learning: Data Mining, Inference, and Prediction, 2nd Edition , 2001, Springer Series in Statistics.
[28] Sungzoon Cho,et al. Constructing response model using ensemble based on feature subset selection , 2006, Expert Syst. Appl..
[29] Ulrich H.-G. Kreßel,et al. Pairwise classification and support vector machines , 1999 .
[30] Taeshik Shon,et al. A hybrid machine learning approach to network anomaly detection , 2007, Inf. Sci..
[31] Magne Setnes,et al. Fuzzy modeling of client preference from large data sets: an application to target selection in direct marketing , 2001, IEEE Trans. Fuzzy Syst..
[32] Byung-Do Kim,et al. Mailing smarter to catalog customers , 2000 .
[33] Lucas M. Venter,et al. A comparison of Intrusion Detection systems , 2001, Comput. Secur..
[34] C. Bauer. A direct mail customer purchase model , 1988 .
[35] Sugata Sanyal,et al. Adaptive neuro-fuzzy intrusion detection systems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[36] Christophe Croux,et al. Bagging and Boosting Classification Trees to Predict Churn , 2006 .
[37] Qi Tian,et al. Feature selection using principal feature analysis , 2007, ACM Multimedia.
[38] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[39] Andrew H. Sung,et al. Intrusion Detection Systems Using Adaptive Regression Splines , 2004, ICEIS.
[40] Sungzoon Cho,et al. Response modeling with support vector machines , 2006, Expert Syst. Appl..
[41] Anup K. Ghosh,et al. A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.
[42] Rita C. Summers. Secure Computing: Threats and Safeguards , 1996 .
[43] David J. Marchette. A Statistical Method for Profiling Network Traffic , 1999, Workshop on Intrusion Detection and Network Monitoring.
[44] Bernhard Sick,et al. Evolutionary optimization of radial basis function classifiers for data mining applications , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).