Databases Reference
In-Depth Information
31. A. Abraham, R. Jain, J. Thomas, and S. Y. Han. D-SCIDS: Distributed soft
computing intrusion detection system,
Journal of Network and Computer
Applications
.
30
, 81-98, (2007).
32. F. Esponda, S. Forrest, and P. Helman. A formal framework of positive and
negative detection,
IEEE Transactions on Systems, Man, and Cybernetics-
Part B
.
34
(1), 357-373, (2004).
33. S. A. Hofmeyr and S. Forrest. Immunity by design: an artificial immune
system. In
Proc. GECCO Conference
, (1999).
34. R. O. Duda, P. E. Hart, and D. G. Stork.
Pattern classification
. (Wiley,
New York, 2001).
35. J. Han and M. Kamber.
Data mining: Concepts and techniques
. (Morgan
Kaufmann, UK, 2001).
36. D. S. Bauer and M. E. Michael. NIDX: an expert system for real time network
intrusion detection. In
Proc. of
the Computer Networking Symposium
,
pp. 90-106, (1988).
37. S. Das. Filters, wrappers and a boosting-based hybrid for feature selection.
In
Proc. 18th Intl. Conf. on Machine Learning
, (2001).
38. R. Kohavi and G. John. Wrapers for feature subset selection,
Artificial
Intelligence
.
97
(1-2), 273-324, (1997).
39. R. Caruana and D. Freitag. Greedy attribute selection. In
Proc. of the 11th
Intl. Conf. on Machine Learning
, p. 2532, (1994).
40. H. Liu and H. Motoda.
Feature Selection for Knowledge Discovery and data
Mining
. (Kluwer Academic Press, 1998).
41. J. Kennedy and R. C. Eberhart. Particle swarm optimization. In
Proc. of
IEEE International Conference on Neural Networks
, pp. 1942-1948, (1995).
42. Y. Shi and R. Eberhart. Empirical study of particle swarm optimization.
In
Proc. of IEEE World Conference on Evolutionary Computation
, pp. 6-9,
(1999).
43. M. Clerc and J. Kennedy. The particle swarm explosion, stability and
convergence in a multidimensional complex space,
Transactions on Evolu-
tioanry computation
.
6
(1), 58-73, (2002).
44. A. Ratnaweera, S. K. Halgamuge, and H. C. Watson. Self-organizing
hirarchical particle swarm optimizer with time varying acceleration
coecients,
IEEE Transactions on Evolutionary Computation
.
8
(3), 240-255,
(2004).
45. K. cup 99. Intrusion detection dataset, (1999). /http://kdd.ics.uci.edu/
databases/kddcup99/kddcup.data 10 percent.gz.