1 |
V. N. Vapnik, 'The Nature of Statistical Learning Theory,' New York, Springer-Verlag, 1995
|
2 |
V. N. Vapnik, 'Statistical Learning Theory,' New York: Wiley, 1998
|
3 |
N. Ye, X. Li, 'scalable clustering technique for intrusion signature recognition,' 2001 IEEE Man Systems and Cybernetics Information Assurance Workshop, West Point, NY, June, 2001
|
4 |
J. Zhu, T. Hastie, 'Kernel Logistic Regression and the Import Vector Machine,' NIPS2001 conference, Vancouver, November, 2001
|
5 |
Lincoln Laboratory, Massachusetts Institute of Technology, http://www.ll.mit.edu/IST/ideval/data
|
6 |
C. Cortes and V. N. Vapnik, 'Support vector networks,' Machine Learning, Vol.20, pp.273-297, 1995
DOI
|
7 |
S. M. Emran, M. Xu, N. Ye, Q. Chen, X. Li, 'Probabilistic techniques for intrusion detection based on computer audit data,' IEEE Transactions on Systems, Man and Cybernetics, Part A, Vol.31, pp.266-274, 2001
DOI
ScienceOn
|
8 |
T. Hastie, R. Tibshirani, J. Friedman, 'The Elements of Statistical Learning,' Springer, 2001
|
9 |
전명식, '수리통계학,' 자유아카데미, 1996
|
10 |
W. Lee, S. J. Stolfo, K. W. Mok, 'A data mining framework for building intrusion detection models,' Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp.120-132, 1999
DOI
|
11 |
이한성, 임영희, 박주영, 박대희, 'SVM과 클러스터링 기반 적응형 침입 탐지 시스템', 퍼지및지능시스템학회논문지, 2003
과학기술학회마을
DOI
|
12 |
M. Pontil and A. Verri, 'Properties of support vector machine,' M. I. T. AI Memo, No.1612, 1997
|
13 |
유신근, 이남훈, 신영철, '침입탐지시스템 평가 방법론', 정보처리학회논문집, Vol.7, No.11, pp.3445-3461, 2000
과학기술학회마을
|
14 |
A. Benhur, D. Horn, H. T. Siegelmann, V. Vapnik, 'A support vector clustering method,' Proceedings. 15th International Conference on Pattern Recognition, Vol.2, pp.724-727, 2000
DOI
|
15 |
G. Casella, R. L. Berger, 'Statistical Inference,' Duxburt Press, 1990
|
16 |
N. Cristianini,J. S. Taylor, 'An Introduction to Support Vector Machine,' Cambridge University Press, 2000
|