A multi-class classification MCLP model with particle swarm optimization for network intrusion detection
暂无分享,去创建一个
[1] Teuvo Kohonen,et al. Self-Organizing Maps, Third Edition , 2001, Springer Series in Information Sciences.
[2] Iftikhar Ahmad,et al. Feature Selection Using Particle Swarm Optimization in Intrusion Detection , 2015, Int. J. Distributed Sens. Networks.
[3] Lina Li,et al. Review of Multiple Criteria and Multiple Constraint-level Linear Programming , 2013, ITQM.
[4] Seyed Mojtaba Hosseini Bamakan,et al. An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization , 2016, Neurocomputing.
[5] J. K. Mandal,et al. Handbook of Research on Natural Computing for Optimization Problems , 2016 .
[6] Anthony Brabazon,et al. Self-organising swarm (SOSwarm) , 2008, Soft Comput..
[7] Russell C. Eberhart,et al. Gene clustering using self-organizing maps and particle swarm optimization , 2003, Proceedings International Parallel and Distributed Processing Symposium.
[8] Yong Shi,et al. Multiple criteria optimization-based data mining methods and applications: a systematic survey , 2010, Knowledge and Information Systems.
[9] Ting Jiang,et al. A novel particle swarm optimization trained support vector machine for automatic sense-through-foliage target recognition system , 2014, Knowl. Based Syst..
[10] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[11] Shahram Jamali,et al. Defense against SYN flooding attacks: A particle swarm optimization approach , 2014, Comput. Electr. Eng..
[12] Seyed Mojtaba Hosseini Bamakan,et al. A New Intrusion Detection Approach Using PSO based Multiple Criteria Linear Programming , 2015, ITQM.
[13] Manoj Kumar Tiwari,et al. Composite particle algorithm for sustainable integrated dynamic ship routing and scheduling optimization , 2016, Comput. Ind. Eng..
[14] M. Bonyadi. Particle swarm optimization: theoretical analysis, modifications, and applications to constrained optimization problems , 2015 .
[15] Sheng-Hsun Hsu,et al. Application of SVM and ANN for intrusion detection , 2005, Comput. Oper. Res..
[16] ShiYong,et al. An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization , 2016 .
[17] M. V. Velzen,et al. Self-organizing maps , 2007 .
[18] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[19] Yong Shi,et al. Credit risk evaluation using multi-criteria optimization classifier with kernel, fuzzification and penalty factors , 2014, Eur. J. Oper. Res..
[20] Yihao Zhang,et al. Real estate price forecasting based on SVM optimized by PSO , 2014 .
[21] Bassem Jarboui,et al. Combinatorial particle swarm optimization for solving blocking flowshop scheduling problem , 2016, J. Comput. Des. Eng..
[22] José Neves,et al. The fully informed particle swarm: simpler, maybe better , 2004, IEEE Transactions on Evolutionary Computation.
[23] Jian Ma,et al. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..
[24] Georgios Kambourakis,et al. Swarm intelligence in intrusion detection: A survey , 2011, Comput. Secur..
[25] Max E. Valentinuzzi. Handbook of bioinspired algorithms and applications , 2006, BioMedical Engineering OnLine.
[26] Noorhaniza Wahid,et al. A hybrid network intrusion detection system using simplified swarm optimization (SSO) , 2012, Appl. Soft Comput..
[27] Behzad Moshiri,et al. Anomaly detection using a self-organizing map and particle swarm optimization , 2011, Sci. Iran..
[28] Zhengxin Chen,et al. Multiple criteria mathematical programming for multi-class classification and application in network intrusion detection , 2009, Inf. Sci..
[29] Haruna Chiroma,et al. A Review of the Advances in Cyber Security Benchmark Datasets for Evaluating Data-Driven Based Intrusion Detection Systems , 2015, SCSE.
[30] Jing He,et al. MCLP-based methods for improving "Bad" catching rate in credit cardholder behavior analysis , 2008, Appl. Soft Comput..
[31] Frank Diederich,et al. Optimization Based Data Mining Theory And Applications , 2016 .
[32] Riccardo Poli,et al. Particle swarm optimization , 1995, Swarm Intelligence.
[33] Ahmed Patel,et al. An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..
[34] Fang Wang,et al. The Application of Multiple Criteria Linear Programming in Advertisement Clicking Events Prediction , 2013, ICCS.
[35] Ngoc Thanh Nguyen,et al. A combined negative selection algorithm-particle swarm optimization for an email spam detection system , 2015, Eng. Appl. Artif. Intell..
[36] Aihua Li,et al. Sensitivity Analysis of b in MCLP Model for Credit Card-Holders Classification , 2013, ITQM.
[37] Anuraganand Sharma,et al. Performance comparison of particle swarm optimization with traditional clustering algorithms used in self organizing map , 2009 .
[38] Martin Chovanec,et al. INTRUSION DETECTION SYSTEM USING SELF ORGANIZING MAP , 2006 .
[39] Mofreh M. Salem,et al. Fragmented protein sequence alignment using two-layer particle swarm optimization (FTLPSO) , 2017 .
[40] Norrozila Sulaiman,et al. Intrusion Detection System Based on SVM for WLAN , 2012 .
[41] Hamed Soleimani,et al. A hybrid particle swarm optimization and genetic algorithm for closed-loop supply chain network design in large-scale networks , 2015 .
[42] Amit Konar,et al. Automatic kernel clustering with a Multi-Elitist Particle Swarm Optimization Algorithm , 2008, Pattern Recognit. Lett..
[43] B. Wang,et al. A Multiple-Criteria and Multiple-Constraint Levels Linear Programming Based Error Correction Classification Model , 2013, ITQM.