Dendron : Genetic trees driven rule induction for network intrusion detection systems
暂无分享,去创建一个
Georgios Kambourakis | Félix Gómez Mármol | Dimitrios Papamartzivanos | Dimitrios Papamartzivanos | G. Kambourakis
[1] Nitesh V. Chawla,et al. C4.5 and Imbalanced Data sets: Investigating the eect of sampling method, probabilistic estimate, and decision tree structure , 2003 .
[2] Safaa O. Al-Mamory,et al. On the designing of two grains levels network intrusion detection system , 2015 .
[3] Pengfei Guo,et al. The enhanced genetic algorithms for the optimization design , 2010, 2010 3rd International Conference on Biomedical Engineering and Informatics.
[4] Ronald L. Rivest,et al. Constructing Optimal Binary Decision Trees is NP-Complete , 1976, Inf. Process. Lett..
[5] Vipin Kumar,et al. Introduction to Data Mining , 2022, Data Mining and Machine Learning Applications.
[6] Francisco Herrera,et al. On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems , 2015, Expert Syst. Appl..
[7] Kalyan Veeramachaneni,et al. AI^2: Training a Big Data Machine to Defend , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).
[8] Georgios Kambourakis,et al. TermID: a distributed swarm intelligence-based approach for wireless intrusion detection , 2017, International Journal of Information Security.
[9] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[10] Isabelle Guyon,et al. An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..
[11] Georgios Kambourakis,et al. Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.
[12] Santosh Biswas,et al. Sequencegram: n-gram modeling of system calls for program based anomaly detection , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).
[13] Antonio F. Gómez-Skarmeta,et al. RepCIDN: A Reputation-based Collaborative Intrusion Detection Network to Lessen the Impact of Malicious Alarms , 2012, Journal of Network and Systems Management.
[14] Shi-Jinn Horng,et al. A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..
[15] Li Zhang,et al. Hybrid decision tree and naïve Bayes classifiers for multi-class classification tasks , 2014, Expert Syst. Appl..
[16] Kenneth de Jong,et al. Evolutionary computation: a unified approach , 2007, GECCO.
[17] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[18] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[19] Ron Kohavi,et al. Wrappers for Feature Subset Selection , 1997, Artif. Intell..
[20] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[21] Adel Nadjaran Toosi,et al. A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers , 2007, Comput. Commun..
[22] Jonathan R. M. Hosking,et al. Partitioning Nominal Attributes in Decision Trees , 1999, Data Mining and Knowledge Discovery.
[23] Arputharaj Kannan,et al. Decision tree based light weight intrusion detection using a wrapper approach , 2012, Expert Syst. Appl..
[24] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[25] Georgios Kambourakis,et al. Swarm intelligence in intrusion detection: A survey , 2011, Comput. Secur..
[26] Usama M. Fayyad,et al. Multi-Interval Discretization of Continuous-Valued Attributes for Classification Learning , 1993, IJCAI.
[27] Igor Kononenko,et al. On Biases in Estimating Multi-Valued Attributes , 1995, IJCAI.
[28] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[29] Félix Gómez Mármol,et al. Improving attack detection in self-organizing networks: A trust-based approach toward alert satisfaction , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[30] Antonio F. Gómez-Skarmeta,et al. Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems , 2014, J. Comput. Syst. Sci..
[31] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[32] Jian Ma,et al. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..
[33] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[34] Thomas Bäck,et al. Evolutionary algorithms in theory and practice - evolution strategies, evolutionary programming, genetic algorithms , 1996 .
[35] Kotagiri Ramamohanarao,et al. Layered Approach Using Conditional Random Fields for Intrusion Detection , 2010, IEEE Transactions on Dependable and Secure Computing.
[36] Maria Dolores Gil Montoya,et al. A Pareto-based multi-objective evolutionary algorithm for automatic rule generation in network intrusion detection systems , 2013, Soft Comput..
[37] Robert Tibshirani,et al. Classification by Pairwise Coupling , 1997, NIPS.
[38] Siyang Zhang,et al. A novel hybrid KPCA and SVM with GA model for intrusion detection , 2014, Appl. Soft Comput..