Intelligent Intrusion Detection System Through Combined and Optimized Machine Learning
暂无分享,去创建一个
[1] E. Chang,et al. State of the art review of the existing bayesian-network based approaches to trust and reputation computation , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).
[2] Saturnino Maldonado-Bascón,et al. Model Selection for Support Vector Machines Using Ant Colony Optimization in an Electronic Nose Application , 2006, ANTS Workshop.
[3] Yoav Freund,et al. A decision-theoretic generalization of on-line learning and an application to boosting , 1995, EuroCOLT.
[4] Milan Tuba,et al. Support vector machine parameter tuning using firefly algorithm , 2016, 2016 26th International Conference Radioelektronika (RADIOELEKTRONIKA).
[5] Joao Paulo Papa,et al. Intrusion Detection System Based On Flows Using Machine Learning Algorithms , 2017, IEEE Latin America Transactions.
[6] Georgios Kambourakis,et al. Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.
[7] Niko Heikura. Analyzing Offensive and Defensive Networking Tools in a Laboratory Environme , 2015 .
[8] Yoav Freund,et al. A decision-theoretic generalization of on-line learning and an application to boosting , 1997, EuroCOLT.
[9] Anita Sahoo,et al. Optimization of SVM classifier using Firefly algorithm , 2013, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).
[10] Zhao Xin,et al. Project financing risk assessment based on ACO and SVM , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.
[11] Kwangjo Kim,et al. Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection , 2016, IEEE Transactions on Cybernetics.
[12] Madan Gopal,et al. A hybrid SVM based decision tree , 2010, Pattern Recognit..
[13] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[14] Wei Hu,et al. AdaBoost-Based Algorithm for Network Intrusion Detection , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[15] Hyun-Chul Kim,et al. Constructing support vector machine ensemble , 2003, Pattern Recognit..
[16] Jean-Marie Flaus,et al. A Deep Learning Approach for Intrusion Detection System in Industry Network , 2018, BDCSIntell.
[17] Chulhyun Kim,et al. Forecasting time series with genetic fuzzy predictor ensemble , 1997, IEEE Trans. Fuzzy Syst..
[18] Quanyan Zhu,et al. Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs , 2018, IEEE Transactions on Signal and Information Processing over Networks.
[19] Harry Zhang,et al. Naive Bayes for optimal ranking , 2008, J. Exp. Theor. Artif. Intell..
[20] Zulaiha Ali Othman,et al. Public domain datasets for optimizing network intrusion and machine learning approaches , 2011, 2011 3rd Conference on Data Mining and Optimization (DMO).
[21] Wolfgang Konen,et al. SVM Ensembles Are Better When Different Kernel Types Are Combined , 2013, ECDA.
[22] Kangfeng Zheng,et al. Intrusion detection algorithm based on density, cluster centers, and nearest neighbors , 2016, China Communications.