Feature Extraction based Approaches for Improving the Performance of Intrusion Detection Systems
暂无分享,去创建一个
[1] Dhruba K. Bhattacharyya,et al. Network Anomaly Detection: A Machine Learning Perspective , 2013 .
[2] LeeSeungmin,et al. A novel hybrid intrusion detection method integrating anomaly detection with misuse detection , 2014 .
[3] Anil K. Jain,et al. Statistical Pattern Recognition: A Review , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[4] M. Govindarajan. Intrusion Detection using an Ensemble of Classification Methods , 2012 .
[5] Oscar Castillo,et al. Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, IMECS 2007, March 21-23, 2007, Hong Kong, China , 2007, IMECS.
[6] Xiangji Huang,et al. Mining network data for intrusion detection through combining SVMs with ant colony networks , 2014, Future Gener. Comput. Syst..
[7] Wei-Ying Ma,et al. Improving text classification using local latent semantic indexing , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).
[8] Habiba Drias,et al. An intrusion detection and alert correlation approach based on revising probabilistic classifiers using expert knowledge , 2012, Applied Intelligence.
[9] Susan T. Dumais,et al. Using Linear Algebra for Intelligent Information Retrieval , 1995, SIAM Rev..
[10] Minyi Guo,et al. Fast dimension reduction for document classification based on imprecise spectrum analysis , 2010, Inf. Sci..
[11] Richard A. Harshman,et al. Indexing by Latent Semantic Analysis , 1990, J. Am. Soc. Inf. Sci..
[12] Anju Vyas. Print , 2003 .
[13] Roberto Battiti,et al. Identifying intrusions in computer networks with principal component analysis , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[14] Haixia Xu,et al. Adaptive Kernel Principal Analysis for Online Feature Extraction , 2009 .
[15] Ning Wang,et al. The optimization of the kind and parameters of kernel function in KPCA for process monitoring , 2012, Comput. Chem. Eng..
[16] Siyang Zhang,et al. A novel hybrid KPCA and SVM with GA model for intrusion detection , 2014, Appl. Soft Comput..
[17] Wei Cong,et al. Anomaly intrusion detection based on PLS feature extraction and core vector machine , 2013, Knowl. Based Syst..
[18] Chou-Yuan Lee,et al. An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection , 2012, Appl. Soft Comput..
[19] Zhenguo Chen,et al. Minimax Probability Machine Classifier with Feature Extraction by Kernel Pca for Intrusion Detection , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[20] Jun Wang,et al. A classification approach for less popular webpages based on latent semantic analysis and rough set model , 2015, Expert Syst. Appl..
[21] Adel Sabry Eesa,et al. A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems , 2015, Expert Syst. Appl..
[22] Alkiviadis G. Akritas,et al. Applications of singular-value decomposition (SVD) , 2004, Math. Comput. Simul..
[23] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[24] N. Balakrishnan,et al. Performance enhancement of Intrusion Detection Systems using advances in sensor fusion , 2008, 2008 11th International Conference on Information Fusion.
[25] Jugal K. Kalita,et al. MIFS-ND: A mutual information-based feature selection method , 2014, Expert Syst. Appl..
[26] Zhifang He,et al. Stock Price Prediction based on SSA and SVM , 2014, ITQM.
[27] Sung-Bae Cho,et al. Rule-based integration of multiple measure-models for effective intrusion detection , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[28] Bernhard Schölkopf,et al. Nonlinear Component Analysis as a Kernel Eigenvalue Problem , 1998, Neural Computation.
[29] Alexander Thomasian,et al. CSVD: Clustering and Singular Value Decomposition for Approximate Similarity Search in High-Dimensional Spaces , 2003, IEEE Trans. Knowl. Data Eng..
[30] Chun-Chin Hsu,et al. An information granulation based data mining approach for classifying imbalanced data , 2008, Inf. Sci..
[31] Norrozila Sulaiman,et al. Intrusion Detection System Based on SVM for WLAN , 2012 .
[32] Lei Zhang,et al. A multi-manifold discriminant analysis method for image feature extraction , 2011, Pattern Recognit..
[33] Serkan Günal,et al. A novel probabilistic feature selection method for text classification , 2012, Knowl. Based Syst..
[34] Lan Wang,et al. Face recognition based on PCA and logistic regression analysis , 2014 .
[35] Neminath Hubballi,et al. False alarm minimization techniques in signature-based intrusion detection systems: A survey , 2014, Comput. Commun..