1 |
D. Parikh and T. Chen, “Data fusion and cost minimization for intrusion detection,” IEEE Transacions on Information Forensics and Security, Vol. 3, No. 3, pp. 381-389, 2008.
DOI
|
2 |
V. A. Sotiris, P.W. Tse and M.G. Pecht, “Anomaly detection through a Bayesian support vector machine,” IEEE Transactions on Reliability, Vol. 59, No. 2, pp. 277-286, 2010.
DOI
|
3 |
X. Xu, “Adaptive intrusion detection based on machine learning: Feature extraction, classifier construction and sequential pattern prediction,” International Journal of Web Services Practices, Vol. 2, No.1, pp. 49-58, 2006.
|
4 |
H. A. Nguyen, and D. Choi, Application of data mining to network intrusion detection: Classifier selection model. Berlin Heidelberg: Springer. 2014.
|
5 |
M. A. M. Hasan, M. Nasser, B. Pal, and S. Ahmad, “Support vector machine and random forest modeling for intrusion detection system (IDS),” Journal of Intelligent Learning Systems and Applications, Vol. 6, pp. 45-52, 2014.
|
6 |
L. Lu, L. Di and Y. Ye, “A decision-tree classifier for extracting transparent plastic-mulched land cover from landsat-5 TM images,” IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, Vol. 7, No. 11, pp. 1314-1330, 2014.
DOI
|
7 |
C. Thomas and N. Balakrishnan, “Improvement in intrusion detection with advances in sensor fusion,” IEEE Transacions on Information Forensics and Security, Vol. 4, No. 3, pp. 542-551, 2009.
DOI
|
8 |
N. Li, W. L. Tsang and Z.H. Zhou, “Efficient optimization of performance measures by classifier adaption,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 13, No. 5, pp. 2683-2695, 2014.
|
9 |
A.J. Ma, P.C. Yuen and J.H. Lai, “Linear dependency modeling for classifier fusion and feature combination,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 35, No. 5, pp. 1135-1148, 2013.
DOI
|
10 |
B. Verma and A. Rahman, “Cluster-Oriented ensemble classifier: impact of multi-cluster characterization on ensemble classifier learning,” IEEE Transactions on Knowledge and Data Engineering, Vol. 24, No. 4, pp. 605-618, 2012.
DOI
|
11 |
S.W. Thomas, M. Nagappan, D. Blostein and A.E. Hassan, “The impact of classifier configuration and classifier combination on bug localization,” IEEE Transactions on Software Engineering, Vol. 7, No. 11, pp. 1314-1330, 2014.
|
12 |
C. Gao, Q. Ge and L. Jian, “Rule extraction from fuzzy-based blast furnace SVM multiclassifier for decision-making,” IEEE Transactions on Fuzzy Systems, Vol. 22, No. 3, pp. 586-596, 2014.
DOI
|
13 |
D. Fisch, E. Kalkowski and B. Sick, “Knowledge fusion for probabilistic generative classifiers with data mining applications,” IEEE Transactions on Knowledge and Data Engineering, Vol. 26, No. 3, pp. 652-666, 2014.
DOI
|
14 |
D. J. Sebald and J.A. Bucklew, “Support vector machine techniques for nonlinear equalization,” IEEE Transactions on Signal Processing, Vol. 48, No. 11, pp. 3217-3226, 2000.
DOI
|
15 |
Z. Ma, Y. Yang, N. Sebe, K. zheng and A.G. Hauptmann, “Multimedia event detection using a classifier-specific intermediate representation,” IEEE Transactions on Multimedia, Vol. 15, No. 7, pp. 1628-1637, 2013.
DOI
|
16 |
X. Zhai, K. Appiah, S. Ehsan, G. Howells, H. Hu, D. Gu, and K.D. McDonald-Maier, “A method for detecting abnormal program behavior on embedded devices,” IEEE Transacions on Information Forensics and Security, Vol. 10, No. 8, pp. 1692-1704, 2015.
DOI
|
17 |
H. Xue, S. Chen and Q. Yang, “Structural regularized support vector machine: A framework for structural large margin classifier,” IEEE Transactions on Neural Networks, Vol. 22, No. 4, pp. 573-587, 2011.
DOI
|
18 |
M.R. Alam and K.M. Muttaqi, A. Bouzerdoum, “An approach for assessing the effectiveness of multiple-feature-based SVM method for islanding detection of distributed generation,” IEEE Transactions on Industry Applications, Vol. 50, No. 4, pp. 2844-2852, 2014.
DOI
|
19 |
F.D. Morsier, D. Tuia, M. Borgeaud, V. Gass and J.P. Thiran, “Semi-Supervised novelty detection using SVM entire solution path,” IEEE Transactions on Geoscience and Remote Sensing, Vol. 51, No. 4, pp. 1939-1950, 2013.
DOI
|
20 |
C. Cortes and V. vapnik, “Support-vector networks,” Machine Learning, Vol. 20, No. 3, pp.273-297, 1995.
DOI
|
21 |
M.S. Yang and K.L. Wu, “A similarity-based robust clustering method,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 26, No. 4, pp. 434-448, 2004.
DOI
|
22 |
B. Minaei-Bidgoli, H. Parvin, H. Alinejad-Rokny, H. Alizadeh and W.E. Punch, “Effects of resampling method and adaptation on clustering ensemble efficacy,” Artif. Intell. Rev., Vol. 41, No. 1, pp. 27-48, 2014.
DOI
|
23 |
T. Xiong and V. Cherkassy, “A combined SVM and LDA approach for classification,” Proceedings of the International Joint Conference on Neural Networks, pp. 1455-1459, 2005.
|
24 |
S. Mika et al, “Fisher discriminant analysis with kernels,” Proceedings of IEEE Neural Networks for Signal Processing Workshop, pp. 41-48, 1999.
|
25 |
R. Ksantini and B. Boufama, “Combining partially global and local characteristics for improved classification,” International Journal of Machine Learning, Vol. 3, pp. 119-131, 2012.
|
26 |
H. Parvin, M. Mirnabibaboli and H. Alinejad-Rokny, “Proposing a classifier ensemble framework based on classifier selection and decision tree,” Engineering Applications of Artificial Intelligence, Vol. 37, pp. 34-42, 2015.
DOI
|
27 |
V. Jaiganesh, S. Mangayarkarasi, and P. Sumathi, “An efficient algorithm for network intrusion detection system,” International Journal of Computer Applications, Vol. 90, No. 12, pp. 12-16, 2014.
DOI
|
28 |
D. M. Farid, N. Harbi, and M.Z. Rahman, “Combining Naïve Bayes and decision tree for adaptive intrusion detection,” International Journal of Network Security and Its Applications, Vol. 2, No. 2, pp. 12-25, 2010.
DOI
|
29 |
V. Vapnik, “The Nature of Statistical Learning Theory,” Spring-Verlag, 1995.
|