Semi-supervised learning methods for network intrusion detection
暂无分享,去创建一个
[1] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[2] Mikhail Belkin,et al. Beyond the point cloud: from transductive to semi-supervised learning , 2005, ICML.
[3] Thorsten Joachims,et al. Transductive Learning via Spectral Graph Partitioning , 2003, ICML.
[4] Chein-I Chang,et al. Robust radial basis function neural networks , 1999, IEEE Trans. Syst. Man Cybern. Part B.
[5] I S Kohane,et al. Mutual information relevance networks: functional genomic clustering using pairwise entropy measurements. , 1999, Pacific Symposium on Biocomputing. Pacific Symposium on Biocomputing.
[6] Zoubin Ghahramani,et al. Combining active learning and semi-supervised learning using Gaussian fields and harmonic functions , 2003, ICML 2003.
[7] Bernhard Schölkopf,et al. Learning with Local and Global Consistency , 2003, NIPS.
[8] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[9] Raymond J. Mooney,et al. Integrating constraints and metric learning in semi-supervised clustering , 2004, ICML.
[10] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[11] Sergey Bratus,et al. Semi-supervised Data Organization for Interactive Anomaly Analysis. , 2006, 2006 5th International Conference on Machine Learning and Applications (ICMLA'06).
[12] Robert K. Cunningham,et al. Results of the DARPA 1998 Offline Intrusion Detection Evaluation , 1999, Recent Advances in Intrusion Detection.
[13] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[14] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[15] Peter Mell,et al. NIST Special Publication on Intrusion Detection Systems , 2001 .
[16] Xin Jin,et al. Meta Learning Intrusion Detection in Real Time Network , 2007, ICANN.
[17] Claire Cardie,et al. Proceedings of the Eighteenth International Conference on Machine Learning, 2001, p. 577–584. Constrained K-means Clustering with Background Knowledge , 2022 .
[18] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[19] Thomas L. Griffiths,et al. Semi-Supervised Learning with Trees , 2003, NIPS.
[20] Jaideep Srivastava,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.
[21] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[22] Xiaojin Zhu,et al. --1 CONTENTS , 2006 .
[23] John McHugh,et al. Defending Yourself: The Role of Intrusion Detection Systems , 2000, IEEE Software.
[24] Salvatore J. Stolfo,et al. A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.
[25] Terran Lane,et al. A Decision-Theoritic, Semi-Supervised Model for Intrusion Detection , 2006 .
[26] Klaus-Robert Müller,et al. Intrusion detection in unlabeled data with quarter-sphere Support Vector Machines , 2004 .
[27] Andrew H. Sung,et al. Intrusion detection using neural networks and support vector machines , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[28] Christin Schäfer,et al. Learning Intrusion Detection: Supervised or Unsupervised? , 2005, ICIAP.
[29] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.