A genetic clustering method for intrusion detection
暂无分享,去创建一个
Wei Zhang | Xiaofeng Liao | Kefei Chen | Yongguo Liu | Wei Zhang | Yongguo Liu | Xiaofeng Liao | Kefei Chen
[1] Keinosuke Fukunaga,et al. A Branch and Bound Clustering Algorithm , 1975, IEEE Transactions on Computers.
[2] Lawrence W. Lan,et al. Genetic clustering algorithms , 2001, Eur. J. Oper. Res..
[3] Wenke Lee,et al. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems , 1999 .
[4] Zbigniew Michalewicz,et al. Genetic algorithms + data structures = evolution programs (3rd ed.) , 1996 .
[5] M. Narasimha Murty,et al. Genetic K-means algorithm , 1999, IEEE Trans. Syst. Man Cybern. Part B.
[6] Rita Cucchiara,et al. Genetic algorithms for clustering in machine vision , 1998, Machine Vision and Applications.
[7] Lin-Yu Tseng,et al. A genetic approach to the automatic clustering problem , 2001, Pattern Recognit..
[8] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[9] Ujjwal Maulik,et al. An evolutionary technique based on K-Means algorithm for optimal clustering in RN , 2002, Inf. Sci..
[10] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[11] T Watson Layne,et al. A Genetic Algorithm Approach to Cluster Analysis , 1998 .
[12] M. Narasimha Murty,et al. Clustering with evolution strategies , 1994, Pattern Recognit..
[13] Michael R. Anderberg,et al. Cluster Analysis for Applications , 1973 .
[14] William L. Fithen,et al. State of the Practice of Intrusion Detection Technologies , 2000 .
[15] Dong-Jo Park,et al. A Novel Validity Index for Determination of the Optimal Number of Clusters , 2001 .
[16] Anil K. Jain,et al. Algorithms for Clustering Data , 1988 .
[17] Eleazar Eskin,et al. Anomaly Detection over Noisy Data using Learned Probability Distributions , 2000, ICML.
[18] Ujjwal Maulik,et al. Genetic clustering for automatic evolution of clusters and application to image classification , 2002, Pattern Recognit..
[19] Richard C. Dubes,et al. Experiments in projection and clustering by simulated annealing , 1989, Pattern Recognit..
[20] Ravi P. Agarwal,et al. Multiple solutions for the Dirichlet second-order boundary value problem of nonsingular type , 1999 .
[21] Shokri Z. Selim,et al. A simulated annealing algorithm for the clustering problem , 1991, Pattern Recognit..
[22] Arthur B. Maccabe,et al. The architecture of a network level intrusion detection system , 1990 .
[23] C. D. Gelatt,et al. Optimization by Simulated Annealing , 1983, Science.
[24] Salvatore J. Stolfo,et al. Mining in a data-flow environment: experience in network intrusion detection , 1999, KDD '99.
[25] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[26] C. A. Murthy,et al. In search of optimal clusters using genetic algorithms , 1996, Pattern Recognit. Lett..
[27] Ujjwal Maulik,et al. Genetic algorithm-based clustering technique , 2000, Pattern Recognit..
[28] Shokri Z. Selim,et al. K-Means-Type Algorithms: A Generalized Convergence Theorem and Characterization of Local Optimality , 1984, IEEE Transactions on Pattern Analysis and Machine Intelligence.