参考文献
|
-
C. ELKAN, "Results of the KDD'99 Classifier Learning Contest". 1999..
-
ACMSIGKDD, "http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html". 1999.
-
BRO. 2014; Available from: https://www.bro.org/index.html.
-
WEKA. 2014; Available from: http://www.cs.waikato.ac.nz/~ml/weka/.
-
SNORT. 2014; Available from: https://www.snort.org/.
-
AMOR, N. B.,BENFERHAT, S.,ELOUEDI, Z.(2004).Naive bayes vs decision trees in intrusion detection systems.Proceedings of the 2004 ACM symposium on Applied computing
-
BOLÓN-CANEDO, V.,SÁ NCHEZ-MAROÑO, N.,ALONSO-BETANZOS, A.(2011).Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset.Expert Systems with Applications,38(5),5947-5957.
-
BOLÓN-CANEDO, V.,SÁNCHEZ-MAROÑO, N.,ALONSO-BETANZOS, A.(2009).A combination of discretization and filter methods for improving classification performance in KDD Cup 99 dataset.Neural Networks, 2009. IJCNN 2009. International Joint Conference on
-
CHANDOLA, V.,BANERJEE, A.,KUMAR, V.(2009).Anomaly detection: A survey.ACM Computing Surveys (CSUR),41(3),15.
-
COOPER, G. F.,HERSKOVITS, E.(1992).A Bayesian method for the induction of probabilistic networks from data.Machine learning,9(4),309-347.
-
CRONE, S. F.,LESSMANN, S.,STAHLBOCK, R.(2006).The impact of preprocessing on data mining: An evaluation of classifier sensitivity in direct marketing.European Journal of Operational Research,173(3),781-800.
-
DASH, M.,LIU, H.(2003).Consistency-based search in feature selection.Artificial Intelligence,151(1-2),155-176.
-
DERRAC, J.,GARCIA, S.,SANCHEZ, L.,HERRERA, F.(2011).KEEL Data-Mining Software Tool: Data Set Repository, Integration of Algorithms and Experimental Analysis Framework.Journal of Multiple-Valued Logic and Soft Computing,17,255–287.
-
HE, H.,GARCIA, E. A.(2009).Learning from imbalanced data.Knowledge and Data Engineering, IEEE Transactions on,21(9),1263-1284.
-
HECKERMAN, D.(2008).A tutorial on learning with Bayesian networks.Innovations in Bayesian Networks
-
HELMAN, P,LIEPINS, G.,RICHARDS.W.(1992).Foundations of intrusion detection[computer security].Computer Security Foundations Workshop V, 1992. Proceedings
-
HORNG, S.-J.,SU, M.-Y.,CHEN, Y.-H.,KAO, T.-W.(2011).A novel intrusion detection system based on hierarchical clustering and support vector machines.Expert Systems with Applications,38(1),306-313.
-
HU, W.,HU, W.,MAYBANK, S.(2008).Adaboost-based algorithm for network intrusion detection.Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on,38(2),577-583.
-
KOC, L.,MAZZUCHI, T. A.,SARKANI, S.(2012).A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier.Expert Systems with Applications,39(18),13492-13500.
-
LIU, H.,SETIONO, R.(1997).Feature selection via discretization.IEEE Transactions on knowledge and Data Engineering,9(4),642-645.
-
QUINLAN, J. R.(1993).C4. 5: programs for machine learning.Morgan kaufmann..
-
RODRIGUEZ, J. J.,KUNCHEVA, L. I.,ALONSO, C. J.(2006).Rotation forest: A new classifier ensemble method.Pattern Analysis and Machine Intelligence, IEEE Transactions on,28(10),1619-1630.
-
SABHNANI, M.,SERPEN, G.(2003).Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context.MLMTA
-
SIVATHA SINDHU, S. S.,GEETHA, S.,KANNAN, A.(2012).Decision tree based light weight intrusion detection using a wrapper approach.Expert Systems with Applications,39(1),129-141.
-
TAVALLAEE, M.,BAGHERI, E.,LU, W,GHORBANI.A.-A.(2009).A detailed analysis of the KDD CUP 99 data set.Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications 2009
-
WOLD, S.,ESBENSEN, K.,GELADI, P.(1987).Principal component analysis.Chemometrics and intelligent laboratory systems,2(1),39-52.
-
XIANG, C.,YONG, P. C.,MENG, L. S.(2008).Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees.Pattern Recognition Letters,29(7),918-924.
-
XIAO, L.,CHEN, Y.,CHANG, C. K.(2014).Bayesian Model Averaging of Bayesian Network Classifiers for Intrusion Detection.Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE 38th International
-
YANG, Y.,WEBB, G. I.(2001).Proportional k-interval discretization for naive-Bayes classifiers.Machine learning: ECML 2001
-
YEUNG, D.-Y.,CHOW, C.(2002).Parzen-window network intrusion detectors.Pattern Recognition, 2002. Proceedings. 16th International Conference on
|