A Network Intrusion Detection Framework based on Bayesian Network using Wrapper Approach
暂无分享,去创建一个
[1] DumanEkrem,et al. A cost-sensitive decision tree approach for fraud detection , 2013 .
[2] ChenTsuhan,et al. Malicious web content detection by machine learning , 2010 .
[3] J. M. Serrano,et al. Association rules applied to credit card fraud detection , 2009, Expert Syst. Appl..
[4] Eric Medvet,et al. Anomaly detection techniques for a web defacement monitoring service , 2011, Expert Syst. Appl..
[5] Hans-Jürgen Zimmermann,et al. Fuzzy set theory , 1992 .
[6] Faisal Muhammad Shah,et al. An ensemble framework of anomaly detection using hybridized feature selection approach (HFSA) , 2015, 2015 SAI Intelligent Systems Conference (IntelliSys).
[7] Tauseef Ibne Mamun,et al. An Analytical Comparison on Filter Feature Extraction Method in Data Mining using J48 Classifier , 2015 .
[8] Shahram Sarkani,et al. A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier , 2012, Expert Syst. Appl..
[9] Yinhui Li,et al. An efficient intrusion detection system based on support vector machines and gradually feature removal method , 2012, Expert Syst. Appl..
[10] Zurina Mohd Hanapi,et al. Hybrid of fuzzy Clustering Neural Network over NSL Dataset for Intrusion Detection System , 2013, J. Comput. Sci..
[11] Ming-Yang Su,et al. Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers , 2011, Expert Syst. Appl..
[12] Carlos García Garino,et al. An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection , 2012, Expert Syst. Appl..
[13] Chowdhury Mofizur Rahman,et al. Adaptive Intrusion Detection based on Boosting and , 2011 .
[14] Adel Sabry Eesa,et al. A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems , 2015, Expert Syst. Appl..
[15] Heekuck Oh,et al. Neural Networks for Pattern Recognition , 1993, Adv. Comput..
[16] Tsuhan Chen,et al. Malicious web content detection by machine learning , 2010, Expert Syst. Appl..
[17] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[18] Shou-Hsuan Stephen Huang,et al. Neural networks-based detection of stepping-stone intrusion , 2010, Expert Syst. Appl..
[19] Raghuveer,et al. Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and Support Vector Machines , 2013 .
[20] Yingjiu Li,et al. An intrusion response decision-making model based on hierarchical task network planning , 2010, Expert Syst. Appl..
[21] Shu-Chin Wang,et al. An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks , 2011, Expert Syst. Appl..
[22] Li Zhang,et al. An adaptive ensemble classifier for mining concept drifting data streams , 2013, Expert Syst. Appl..
[23] Abdur Rahman Onik,et al. Cross-breed type Bayesian network based intrusion detection system (CBNIDS) , 2015, 2015 18th International Conference on Computer and Information Technology (ICCIT).
[24] Dewan Md. Farid,et al. Application of Machine Learning Approaches in Intrusion Detection System: A Survey , 2015 .
[25] Gisung Kim,et al. A novel hybrid intrusion detection method integrating anomaly detection with misuse detection , 2014, Expert Syst. Appl..
[26] William Eberle,et al. Genetic algorithms in feature and instance selection , 2013, Knowl. Based Syst..
[27] Cungen Cao,et al. Some issues about outlier detection in rough set theory , 2009, Expert Syst. Appl..
[28] Ekrem Duman,et al. A cost-sensitive decision tree approach for fraud detection , 2013, Expert Syst. Appl..
[29] Hyunwoo Kim,et al. Advanced probabilistic approach for network intrusion forecasting and detection , 2013, Expert Syst. Appl..