Anomaly Detection with the Voronoi Diagram Evolutionary Algorithm
暂无分享,去创建一个
Laurent Navarro | Marc Schoenauer | Luis Martí | Arsène Fansi Tchango | Marc Schoenauer | Luis Martí | A. F. Tchango | Laurent Navarro
[1] Stephen Northcutt,et al. Network intrusion detection , 2003 .
[2] Kalyanmoy Deb,et al. A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..
[3] Michèle Sebag,et al. Compact Unstructured Representations for Evolutionary Design , 2002, Applied Intelligence.
[4] Zhou Ji,et al. Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.
[5] Hans-Paul Schwefel,et al. Numerical Optimization of Computer Models , 1982 .
[6] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[7] Laurent Navarro,et al. VorAIS: A Multi-Objective Voronoi Diagram-based Artificial Immune System , 2016, GECCO.
[8] S. García,et al. An Extension on "Statistical Comparisons of Classifiers over Multiple Data Sets" for all Pairwise Comparisons , 2008 .
[9] Johannes Bader,et al. Hypervolume-based search for multiobjective optimization: Theory and methods , 2010 .
[10] Robert P. W. Duin,et al. Support Vector Data Description , 2004, Machine Learning.
[11] Julie Greensmith,et al. Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.