Effective discriminant function for intrusion detection using SVM
暂无分享,去创建一个
[1] Brett J. Borghetti,et al. A Survey of Distance and Similarity Measures Used Within Network Intrusion Anomaly Detection , 2015, IEEE Communications Surveys & Tutorials.
[2] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[3] Lang Yu,et al. Intrusion detection using rough set classification , 2004, Journal of Zhejiang University. Science.
[4] M. Aizerman,et al. Theoretical Foundations of the Potential Function Method in Pattern Recognition Learning , 1964 .
[5] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[6] Huan Liu,et al. Feature Selection for Classification , 1997, Intell. Data Anal..
[7] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[8] P. Langley. Selection of Relevant Features in Machine Learning , 1994 .
[9] Xie Yong,et al. An intelligent anomaly analysis for intrusion detection based on SVM , 2012, 2012 International Conference on Computer Science and Information Processing (CSIP).
[10] Bertrand Portier Froment-Curtil. Data Mining Techniques for Intrusion Detection , 2000 .
[11] M. Tech,et al. Data Mining Techniques for Intrusion Detection , 2015 .
[12] Chuanhe Huang,et al. Selection of Candidate Support Vectors in incremental SVM for network intrusion detection , 2014, Comput. Secur..
[13] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[14] John A. Clark,et al. Evolutionary computation techniques for intrusion detection in mobile ad hoc networks , 2011, Comput. Networks.
[15] William L. Fithen,et al. State of the Practice of Intrusion Detection Technologies , 2000 .
[16] Carlos García Garino,et al. Automatic network intrusion detection: Current techniques and open issues , 2012, Comput. Electr. Eng..
[17] Christian Callegari,et al. Advances in Computing, Communications and Informatics (ICACCI) , 2015 .
[18] Jérôme Darmont,et al. Scaling up Detection Rates and Reducing False Positives in Intrusion Detection using NBTree , 2010 .