Min-max hyperellipsoidal clustering for anomaly detection in network security
暂无分享,去创建一个
[1] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[2] Gürsel Serpen,et al. Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context , 2003, MLMTA.
[3] Kymie M. C. Tan,et al. Determining the operational limits of an anomaly-based intrusion detector , 2003, IEEE J. Sel. Areas Commun..
[4] Mineichi Kudo,et al. Construction of class regions by a randomized algorithm: a randomized subclass method , 1996, Pattern Recognit..
[5] A.N. Zincir-Heywood,et al. On the capability of an SOM based intrusion detection system , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[6] Teuvo Kohonen,et al. Self-Organizing Maps, Third Edition , 2001, Springer Series in Information Sciences.
[7] Satinder Singh,et al. Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters , 2005, ACSC.
[8] Morteza Amini,et al. Network-Based Intrusion Detection Using Unsupervised Adaptive Resonance Theory ( ART ) , 2022 .
[9] S. T. Sarasamma,et al. Hierarchical Kohonenen net for anomaly detection in network security , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[10] T. Lane,et al. Sequence Matching and Learning in Anomaly Detection for Computer Security , 1997 .
[11] Hadar I. Avi-Itzhak,et al. Multiple Subclass Pattern Recognition: A Maximin Correlation Approach , 1995, IEEE Trans. Pattern Anal. Mach. Intell..
[12] Christopher Leckie,et al. Adaptive Clustering for Network Intrusion Detection , 2004, PAKDD.
[13] Christopher Leckie,et al. Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters , 2005, ACSC.
[14] Ulf Lindqvist,et al. Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[15] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[16] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[17] S. Marsland. Novelty Detection in Learning Systems , 2008 .
[18] João Cesar M. Mota,et al. Condition monitoring of 3G cellular networks through competitive neural models , 2005, IEEE Transactions on Neural Networks.
[19] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[20] Qiuming Zhu,et al. A multiple hyper-ellipsoidal subclass model for an evolutionary classifier , 2001, Pattern Recognit..
[21] Simon Haykin,et al. On Different Facets of Regularization Theory , 2002, Neural Computation.
[22] A. Kirsch. An Introduction to the Mathematical Theory of Inverse Problems , 1996, Applied Mathematical Sciences.
[23] Sushil Jajodia,et al. Detecting Novel Network Intrusions Using Bayes Estimators , 2001, SDM.
[24] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[25] Wade M. Jackson,et al. A comparison of the classical and the linear programming approaches to the classification problem in discriminant analysis , 1992 .
[26] Y. Nakamori,et al. Identification of Fuzzy Prediction Models Through Hyperellipsoidal Clustering , 1994, IEEE Trans. Syst. Man Cybern. Syst..
[27] Jaideep Srivastava,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.
[28] Prasert Kanthamanon,et al. Hybrid Neural Networks for Intrusion Detection System , 2002 .
[29] James A. Mahaffey,et al. Multiple Self-Organizing Maps for Intrusion Detection , 2000 .
[30] Peter G. Neumann,et al. Experience with EMERALD to Date , 1999, Workshop on Intrusion Detection and Network Monitoring.
[31] Salvatore J. Stolfo,et al. Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[32] Kymie M. C. Tan,et al. Anomaly Detection in Embedded Systems , 2002, IEEE Trans. Computers.
[33] Teuvo Kohonen,et al. Self-Organizing Maps , 2010 .
[34] R. Sekar,et al. Specification-based anomaly detection: a new approach for detecting network intrusions , 2002, CCS '02.