Real detection intrusion using supervised and unsupervised learning
暂无分享,去创建一个
[1] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[2] Fabio Roli,et al. Network Intrusion Detection by Combining One-Class Classifiers , 2005, ICIAP.
[3] Ajith Abraham,et al. Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..
[4] Mohammad Saniee Abadeh,et al. A parallel genetic local search algorithm for intrusion detection in computer networks , 2007, Eng. Appl. Artif. Intell..
[5] Cheng Xiang,et al. Design of Multiple-Level Hybrid Classifier for Intrusion Detection System , 2005, 2005 IEEE Workshop on Machine Learning for Signal Processing.
[6] Rakesh Agarwal,et al. Fast Algorithms for Mining Association Rules , 1994, VLDB 1994.
[7] Andrew H. Sung,et al. Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..
[8] Wenke Lee,et al. McPAD: A multiple classifier system for accurate payload-based anomaly detection , 2009, Comput. Networks.
[9] Abdolreza Mirzaei,et al. Intrusion detection using fuzzy association rules , 2009, Appl. Soft Comput..
[10] Dong Seong Kim,et al. INTRUSION DETECTION SYSTEM , 2013 .
[11] Fabio Roli,et al. Intrusion detection in computer networks by a modular ensemble of one-class classifiers , 2008, Inf. Fusion.
[12] Mohammad Zulkernine,et al. Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection , 2006, 2006 IEEE International Conference on Communications.
[13] Fabio Roli,et al. A Modular Multiple Classifier System for the Detection of Intrusions in Computer Networks , 2003, Multiple Classifier Systems.
[14] Atsushi Imiya,et al. Machine Learning and Data Mining in Pattern Recognition , 2013, Lecture Notes in Computer Science.
[15] Siti Mariyam Shamsuddin,et al. Ensemble classifiers for network intrusion detection system , 2009 .
[16] Leo Breiman,et al. Classification and Regression Trees , 1984 .
[17] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[18] Yoram Singer,et al. Improved Boosting Algorithms Using Confidence-rated Predictions , 1998, COLT' 98.
[19] Alfonso Valdes,et al. Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.
[20] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[21] 金田 重郎,et al. C4.5: Programs for Machine Learning (書評) , 1995 .
[22] Qiang Chen,et al. Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection , 2002, IEEE Trans. Computers.
[23] Yoram Singer,et al. Improved Boosting Algorithms Using Confidence-rated Predictions , 1998, COLT' 98.
[24] H. Javitz,et al. Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System ( NIDES ) 1 , 1997 .
[25] Fabio Roli,et al. Intrusion detection in computer networks by multiple classifier systems , 2002, Object recognition supported by user interaction for service robots.
[26] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[27] S. E. Smaha. Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.