Network Anomaly Classification by Support Vector Classifiers Ensemble and Non-linear Projection Techniques
暂无分享,去创建一个
Julio Ortega Lopera | Eduardo de la Hoz Correa | Andrés Ortiz | Emiro de la Hoz Franco | J. Lopera | Andrés Ortiz
[1] Ali A. Ghorbani,et al. IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS 1 Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods , 2022 .
[2] Gunnar Rätsch,et al. An introduction to kernel-based learning algorithms , 2001, IEEE Trans. Neural Networks.
[3] Jean-Pierre Nziga,et al. Minimal dataset for Network Intrusion Detection Systems via dimensionality reduction , 2011, 2011 Sixth International Conference on Digital Information Management.
[4] Malcolm I. Heywood,et al. A Hierarchical SOM based Intrusion Detection System , 2008 .
[5] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[6] Erkki Oja,et al. Artificial Neural Networks and Neural Information Processing — ICANN/ICONIP 2003 , 2003, Lecture Notes in Computer Science.
[7] Kristin P. Bennett,et al. Multicategory Classification by Support Vector Machines , 1999, Comput. Optim. Appl..
[8] Alexander Hofmann,et al. Intrusion Detection in Computer Networks with Neural and Fuzzy Classifiers , 2003, ICANN.
[9] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[10] Salvatore J. Stolfo,et al. A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.
[11] Manas Ranjan Patra,et al. Discriminative multinomial Naïve Bayes for network intrusion detection , 2010, 2010 Sixth International Conference on Information Assurance and Security.
[12] J. Tenenbaum,et al. A global geometric framework for nonlinear dimensionality reduction. , 2000, Science.
[13] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[14] Isabelle Guyon,et al. Comparison of classifier methods: a case study in handwritten digit recognition , 1994, Proceedings of the 12th IAPR International Conference on Pattern Recognition, Vol. 3 - Conference C: Signal Processing (Cat. No.94CH3440-5).
[15] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[16] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[17] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[18] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.