1 |
A.H. Sung, S. Mukkamala, "Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks" Proceedings of the 2003 Symposium on Applications and the Internet, 2003.
|
2 |
Nong Ye, "A Scalable Clustering Technique for Intrusion Signature Recognition," Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, 2001.
|
3 |
P. Hall, D. Marshall, R. Martin., "Incremental eigenalysis for classification", In British Machine Vision Conference, Vol. 1, pp. 286-295, 1998.
|
4 |
H. Chen, R.-W. Liu, "Adaptive distributed orthogonalization processing for principal components analysis", Acoustics Speech and Signal Processing, Vol. 2, pp. 293-296, 1992.
|
5 |
J. A. K Suykens, J. Vandewalle : "Multiclass Least Squares Support Vector Machines", Proc. International Joint Conference on Neural Networks, Washington DC, 1999.
|
6 |
MU Xin-guo, Hao Wen-ning, Zaho En-Lai, Chen Gang "An incremental LS-SVM learning algorithm ILS-SVM" International Conference on E-Business and E-Government ICEE, 2011.
|
7 |
https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
|
8 |
Yasir Hamid, M Sugumaran, Ludovic Journaux " Machine Learning Techniques for Intrusion Detection : A Comparative Analysis", International Conference on Informatics and Analytics ICIA 2016, 2016.
|
9 |
Mahdi Zamani "Machine Learning Techniques for Intrusion Detection" arXiv, 2013.
|