Databases Reference
In-Depth Information
31. A. Abraham, R. Jain, J. Thomas, and S. Y. Han. D-SCIDS: Distributed soft
computing intrusion detection system, Journal of Network and Computer
Applications . 30 , 81-98, (2007).
32. F. Esponda, S. Forrest, and P. Helman. A formal framework of positive and
negative detection, IEEE Transactions on Systems, Man, and Cybernetics-
Part B . 34 (1), 357-373, (2004).
33. S. A. Hofmeyr and S. Forrest. Immunity by design: an artificial immune
system. In Proc. GECCO Conference , (1999).
34. R. O. Duda, P. E. Hart, and D. G. Stork. Pattern classification . (Wiley,
New York, 2001).
35. J. Han and M. Kamber. Data mining: Concepts and techniques . (Morgan
Kaufmann, UK, 2001).
36. D. S. Bauer and M. E. Michael. NIDX: an expert system for real time network
intrusion detection. In Proc. of
the Computer Networking Symposium ,
pp. 90-106, (1988).
37. S. Das. Filters, wrappers and a boosting-based hybrid for feature selection.
In Proc. 18th Intl. Conf. on Machine Learning , (2001).
38. R. Kohavi and G. John. Wrapers for feature subset selection, Artificial
Intelligence . 97 (1-2), 273-324, (1997).
39. R. Caruana and D. Freitag. Greedy attribute selection. In Proc. of the 11th
Intl. Conf. on Machine Learning , p. 2532, (1994).
40. H. Liu and H. Motoda. Feature Selection for Knowledge Discovery and data
Mining . (Kluwer Academic Press, 1998).
41. J. Kennedy and R. C. Eberhart. Particle swarm optimization. In Proc. of
IEEE International Conference on Neural Networks , pp. 1942-1948, (1995).
42. Y. Shi and R. Eberhart. Empirical study of particle swarm optimization.
In Proc. of IEEE World Conference on Evolutionary Computation , pp. 6-9,
(1999).
43. M. Clerc and J. Kennedy. The particle swarm explosion, stability and
convergence in a multidimensional complex space, Transactions on Evolu-
tioanry computation . 6 (1), 58-73, (2002).
44. A. Ratnaweera, S. K. Halgamuge, and H. C. Watson. Self-organizing
hirarchical particle swarm optimizer with time varying acceleration
coecients, IEEE Transactions on Evolutionary Computation . 8 (3), 240-255,
(2004).
45. K. cup 99. Intrusion detection dataset, (1999). /http://kdd.ics.uci.edu/
databases/kddcup99/kddcup.data 10 percent.gz.
Search WWH ::




Custom Search