PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM CLASSIFIERS USING VARIOUS FEATURE REDUCTION TECHNIQUES
暂无分享,去创建一个
[1] R. Lippmann,et al. Passive Operating System Identification From TCP / IP Packet Headers * , 2003 .
[2] Alok N. Choudhary,et al. A reconfigurable architecture for network intrusion detection using principal component analysis , 2006, FPGA '06.
[3] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[4] Khaled Labib,et al. NSOM: A Real-Time Network-Based Intrusion Detection System Using Self-Organizing Maps , 2002 .
[5] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[6] Hans-Peter Kriegel,et al. The pyramid-technique: towards breaking the curse of dimensionality , 1998, SIGMOD '98.
[7] Hubert Kordylewski,et al. A large memory storage and retrieval neural network for medical and engineering diagnosis/fault detection , 1998 .
[8] Daniel Graupe,et al. Principles of Artificial Neural Networks , 2018, Advanced Series in Circuits and Systems.
[9] Erkki Oja,et al. Independent component analysis: algorithms and applications , 2000, Neural Networks.
[10] S. Selvan,et al. Intrusion Detection using an Improved Competitive Learning Lamstar Neural Network , 2007 .
[11] Morteza Amini,et al. Network-Based Intrusion Detection Using Unsupervised Adaptive Resonance Theory ( ART ) , 2022 .
[12] Carla E. Brodley,et al. Temporal sequence learning and data reduction for anomaly detection , 1998, CCS '98.
[13] Jing Gao,et al. A Novel Framework for Incorporating Labeled Examples into Anomaly Detection , 2006, SDM.
[14] V.V. Phoha,et al. Dimension reduction using feature extraction methods for real-time misuse detection systems , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[15] M. Shyu,et al. A Novel Anomaly Detection Scheme Based on Principal Component Classifier , 2003 .
[16] I K Fodor,et al. A Survey of Dimension Reduction Techniques , 2002 .