A Feature Selection Approach for Network Intrusion Classification: The Bi-Layer Behavioral-Based
暂无分享,去创建一个
[1] Huan Liu,et al. Feature Selection for High-Dimensional Data: A Fast Correlation-Based Filter Solution , 2003, ICML.
[2] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[3] Huan Liu,et al. Feature selection for clustering - a filter solution , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..
[4] Mohamed Ben Ahmed,et al. Intrusion detection based on “Hybrid” propagation in Bayesian Networks , 2009, 2009 IEEE International Conference on Intelligence and Security Informatics.
[5] Huan Liu,et al. Consistency-based search in feature selection , 2003, Artif. Intell..
[6] Huan Liu,et al. Feature Selection for Classification , 1997, Intell. Data Anal..
[7] Isabelle Guyon,et al. An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..
[8] Lalitha Rangarajan,et al. Bi-level dimensionality reduction methods using feature selection and feature extraction , 2010 .
[9] Malcolm I. Heywood,et al. Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 , 2005, PST.
[10] Yinhui Li,et al. An efficient intrusion detection system based on support vector machines and gradually feature removal method , 2012, Expert Syst. Appl..
[11] Nasser Yazdani,et al. Mutual information-based feature selection for intrusion detection systems , 2011, J. Netw. Comput. Appl..
[12] Xin Jin,et al. Machine Learning Techniques and Chi-Square Feature Selection for Cancer Classification Using SAGE Gene Expression Profiles , 2006, BioDM.
[13] Xin Xu. Adaptive Intrusion Detection Based on Machine Learning: Feature Extraction, Classifier Construction and Sequential Pattern Prediction , 2006 .
[14] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[15] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[16] Aboul Ella Hassanien,et al. Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification , 2011, FGIT-SecTech.
[17] Sam Kwong,et al. Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection , 2007, Pattern Recognition.
[18] Daphne Koller,et al. Toward Optimal Feature Selection , 1996, ICML.
[19] V.V. Phoha,et al. Dimension reduction using feature extraction methods for real-time misuse detection systems , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[20] Filippo Menczer,et al. Feature selection in unsupervised learning via evolutionary search , 2000, KDD '00.
[21] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[22] Ron Kohavi,et al. Wrappers for Feature Subset Selection , 1997, Artif. Intell..
[23] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[24] Wei Wang,et al. Towards Fast Detecting Intrusions: Using Key Attributes of Network Traffic , 2008, 2008 The Third International Conference on Internet Monitoring and Protection.
[25] Fuhui Long,et al. Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy , 2003, IEEE Transactions on Pattern Analysis and Machine Intelligence.