An Adaptive Network Intrusion Detection Method Based on PCA and Support Vector Machines
暂无分享,去创建一个
Xin Xu | Xuening Wang | Xin Xu | Xuening Wang
[1] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .
[2] Philip K. Chan,et al. Learning nonstationary models of normal network traffic for detecting novel attacks , 2002, KDD.
[3] Salvatore J. Stolfo,et al. Adaptive Intrusion Detection: A Data Mining Approach , 2000, Artificial Intelligence Review.
[4] I. Jolliffe. Principal Component Analysis , 2002 .
[6] Susan M. Bridges,et al. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection , 2000 .
[7] Robert K. Cunningham,et al. Improving Intrusion Detection Performance using Keyword Selection and Neural Networks , 2000, Recent Advances in Intrusion Detection.
[8] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[9] Anupam Joshi,et al. Fuzzy clustering for intrusion detection , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..
[10] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[11] John C. Platt,et al. Fast training of support vector machines using sequential minimal optimization, advances in kernel methods , 1999 .
[12] Chih-Jen Lin,et al. Formulations of Support Vector Machines: A Note from an Optimization Point of View , 2001, Neural Computation.
[13] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.