1 |
Gyeong-Il Shin, Hosang Yooun, DongIl Shin, DongKyoo Shin, "Incremental learning method for cyber intelligence, surveillance, and reconnaissance in closed military network using converged IT techniques," Soft Computing, Vol 22, No. 20, pp.6835-6844, August, 2018.
DOI
|
2 |
Hurley, Matthew M. "For and from cyberspace: Conceptualizing cyber intelligence, surveillance, and reconnaissance," Air & Space Power Journal, Vol. 26, No.6, pp.12-33, December, 2012.
|
3 |
JH. Eom, NU. Kim and SH Kim, "Cyber military strategy for cyberspace superiority in cyber warfare," in Proc. of IEEE Conf. Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) International Conference, pp.295-299, July, 2012.
|
4 |
Sung Soo Choi, Tae Myeong Jeong and Jung ho Eom, "An Introduction of Cyber Warfare Attack and Security Techniques," 1th Edition, HongRung Publishing Company, 2012.
|
5 |
Karri Wihersaari, "Intelligence acquisition methods in cyber domain: examining the circumstantial applicability of cyber intelligence acquisition methods using a hierarchical mode," National Defense University Course Library, pp.1-63, April, 2015.
|
6 |
Song Qinbao, Jingjie Ni, and Guangtao Wang, "A fast clustering-based feature subset selection algorithm for high-dimensional data," IEEE transactions on knowledge and data engineering, Vol 25, No. 1, pp.1-14, August, 2011.
DOI
|
7 |
Chandrashekar, Girish, and Ferat Sahin, "A survey on feature selection methods," Computers & Electrical Engineering, Vol 40, No. 1, pp.16-28, January, 2014.
DOI
|
8 |
Hasan, Md Al Mehedi, et al., "Feature selection for intrusion detection using random forest," Journal of Information Security, Vol 7, No. 3, pp.129-140, July, 2016.
DOI
|
9 |
Chandolikar, N. S., and V. D. Nandavadekar, "Selection of relevant feature for intrusion attack classification by analyzing KDD Cup 99," MIT International Journal of Computer Science & Information Technology, Vol 2, No. 2, pp.85-90, August, 2012.
|
10 |
Lefakis Leonidas, and François Fleuret, "Jointly informative feature selection made tractable by Gaussian modeling," Journal of Machine Learning Research, Vol 17, No. 182, pp.1-39, 2016.
|
11 |
Leordeanu Marius, Alexandra Radu, and Rahul Sukthankar, "Features in concert: Discriminative feature selection meets unsupervised clustering," arXiv preprint arXiv:1411.7714, November, 2014.
|
12 |
Wen Xuezhi, et al., "Efficient feature selection and classification for vehicle detection," IEEE Transactions on Circuits and Systems for Video Technology, Vol 25, No. 3, pp.508-517, September, 2015.
DOI
|
13 |
Hyunjung Ji, Donghwa Kim, Dongil Shin, Dongkyoo Shin, "A Study on comparison of KDD CUP 99 and NSL-KDD using artificial neural network," Lecture Notes in Electrical Engineering, Vol. 474, pp.452-457, December, 2017.
|
14 |
Ian H. Witten, Eibe Frank, Mark A. Hall and Christopher J. Pal, Data Mining, 4th Edition, Morgan Kaufmann, 2017.
|
15 |
Ron Kohavi and George H. John, "Wrappers for feature subset selection," Artificial Intelligence, Vol. 97, pp.273-324, December, 1997.
DOI
|
16 |
Anil Jain and Douglas Zongker, "Feature selection: evaluation, application, and small sample performance," IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 19, No. 2, pp. 153-158, February 1997.
DOI
|
17 |
Guyon, Isabelle. and Elisseeff, "An introduction to variable and feature selection," Journal of Machine Learning Research, Vol. 3, pp. 1157-1182, March, 2003.
|
18 |
Huan Liu and Lei Yu, "Toward integrating feature selection algorithms for classification and clustering," IEEE Transactions on Knowledge and Data Engineering, Vol. 17, No. 4, pp. 491-502, March, 2005.
DOI
|