A Survey on Intrusion Detection Systems and Classification Techniques
暂无分享,去创建一个
[1] Kyaw Thet Khaing,et al. Enhanced Features Ranking and Selection using Recursive Feature Elimination ( RFE ) and k-Nearest Neighbor Algorithms in Support Vector Machine for Intrusion Detection System , 2010 .
[2] Reema Patel,et al. A Survey and Comparative Analysis of Data Mining Techniques for Network Intrusion Detection Systems , 2012 .
[3] Hyeran Byun,et al. Applications of Support Vector Machines for Pattern Recognition: A Survey , 2002, SVM.
[4] Md. Abu Naser Bikas,et al. An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.
[5] V. Ch. Venkaiah,et al. Intrusion Detection Systems - Analysis and Containment of False Positives Alerts , 2010 .
[6] Navdeep Singh,et al. A Survey of Intrusion Detection Techniques , 2013 .
[7] Bu-Sung Lee,et al. Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA , 2011, IEEE Transactions on Dependable and Secure Computing.
[8] Manish Joshi. Classification , Clustering And Intrusion Detection System , 2012 .
[9] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[10] Daniel S. Yeung,et al. Weighted Mahalanobis Distance Kernels for Support Vector Machines , 2007, IEEE Transactions on Neural Networks.
[11] Dianhui Wang,et al. Extreme learning machines: a survey , 2011, Int. J. Mach. Learn. Cybern..
[12] Glenn Fung,et al. Multicategory Proximal Support Vector Machine Classifiers , 2005, Machine Learning.