A Multiple-Criteria Quadratic Programming Approach to Network Intrusion Detection
暂无分享,去创建一个
Xiaojun Chen | Zhengxin Chen | Yi Peng | Gang Kou | Yong Shi | Yi Peng | Gang Kou | Zhengxin Chen | Xiaojun Chen | Yong-yu Shi
[1] Teresa F. Lunt,et al. A survey of intrusion detection techniques , 1993, Comput. Secur..
[2] Barry Smyth,et al. Advances in Case-Based Reasoning , 1996, Lecture Notes in Computer Science.
[3] D. Opitz,et al. Popular Ensemble Methods: An Empirical Study , 1999, J. Artif. Intell. Res..
[4] Xiaoning Zhang,et al. Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods , 2001, Decis. Sci..
[5] Salvatore J. Stolfo,et al. Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[6] Yi Peng,et al. Data Mining via Multiple Criteria Linear Programming: Applications in Credit Card Portfolio Management , 2002, Int. J. Inf. Technol. Decis. Mak..
[7] Padraig Cunningham,et al. An Approach to Aggregating Ensembles of Lazy Learners That Supports Explanation , 2002, ECCBR.