References
- T. Bhaskar et al., "A Hybrid Model for Network Security Systems: Integrating Intrusion Detection System with Survivability," Int. J. Netw. Security, vol. 7, no. 2, 2008, pp. 249-260.
- P. Kabiri and A. Ghorbani, "Research on Intrusion Detection and Response: A Survey," Int. J. Netw. Security, vol. 1, no. 2, 2005, pp. 84-102.
- I.-V. Onut A. Ghorbani, "A Feature Classification Scheme for Network Intrusion Detection," Int. J. Netw. Security, vol. 5, no. 1, 2007, pp. 1-15.
- Z. Zhang et al., "An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection," Int. J. Netw. Security, vol. 4, no. 3, 2007, pp. 292-305.
- S.S. Kandeeban and R. Rajesh, "Integrated Intrusion Detection System Using Soft Computing," Int. J. Netw. Security, vol. 10, no. 2, Mar. 2010, pp. 87-92.
- N. Srinivasan and V. Vaidehi, "Performance Analysis of Soft Computing Based Anomaly Detectors," Int. J. Netw. Security, vol. 7, no. 3, 2008, pp. 436-447.
- P. Langley, Elements of Machine Learning, San Francisco, CA: Morgan Kaufmann, 1996.
- K. Fukunaga, Introduction to Statistical Pattern Recognition, Boston, MA: Academic Press, 1990.
- L.O. Jimenez and D. Landgrebe, "Supervised Classification in High-Dimensional Space: Geometrical, Statistical and Asymptotical Properties of Multivariate Data," IEEE Trans. Syst., Man, Cybern., vol. 28, no. 1, 1997, pp. 39-54.
- K. Pearson, "On Lines and Planes of Closest Fit to Systems of Points in Space," Philosophical Mag., vol. 2, no. 11, 1901, pp. 559-572. https://doi.org/10.1080/14786440109462720
- C. Spearman, "General Intelligence Objectively Determined and Measured," American J. Psychology, vol. 15, no. 2, 1904, pp. 206-221.
- S. Axler, Linear Algebra Done Right, New York, NY: Springer- Verlag, 1995.
- W.S. Torgerson, "Multidimensional Scaling I: Theory and Method," Psychometrika, vol. 17, 1952, pp. 401-419. https://doi.org/10.1007/BF02288916
- M.J. Middlemiss and G. Dick, "Weighted Feature Extraction Using a Genetic Algorithm for Intrusion Detection," Evolutionary Computation, vol. 3, 2003, pp. 1699-1675.
- T. Xia et al., "An Efficient Network Intrusion Detection Method Based on Information Theory and Genetic Algorithm," Proc. 24th IEEE Int. Performance Comput. Commun. Conf., Apr. 2005, pp. 11-17.
- A. Chittur; Model Generation for an Intrusion Detection System Using Genetic Algorithms, high school honors thesis, Ossining High School, Ossining, NY, USA, Nov. 2001.
- W. Lu and I. Traore, "Detecting New Forms of Network Intrusion Using Genetic Programming," Computational Intell., Malden, MA: Blackwell Publishing, vol. 20, no. 3, 2004, pp. 475-494.
- W. Li, "Using Genetic Algorithm for Network Intrusion Detection," SANS Institute, USA, 2004.
- G. Jian, L. Da-xin, and C. Bin-ge, "An Induction Learning Approach for Building Intrusion Detection Models Using Genetic Algorithms," Proc. 5th World Congress Intell. Control Autom., June 15-19, vol. 5, 2004, pp. 4339-4342.
- J. Goldberger et al., "Neighborhood Components Analysis," Proc. Adv. Neural Inf. Process., Whistler, BC, Canada, 2005, pp. 571- 577.
- N. Singh-Miller, M. Collins, and T.J. Hazen, "Dimensionality Reduction for Speech Recognition Using Neighborhood Components Analysis," Proc. Interspeech, 2007, pp. 1158-1161.
- A. Amine et al., "GA-SVM and Mutual Information Based Frequency Feature Selection for Face Recognition" GSCMLRIT, Faculty of Sciences, Mohammed V University, B.P. 1014, Rabat, Morocco.
- S. Sethuramalingam and E.R. Naganathan, "Hybrid Feature Selection for Network Intrusion," Int. J. Computer Sci. Eng., vol. 3, no. 5, 2011, pp. 1773-1780.
- http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.htm
- S. Axelsson, "The Base-Rate Fallacy and the Difficulty of Intrusion Detection," ACM Trans. Inf. Syst. Security, vol. 3, no. 3, Aug. 2000, pp. 186-205. https://doi.org/10.1145/357830.357849
- P. Dokas et al., "Data Mining for Network Intrusion Detection," Proc. NSF Workshop Next Generation Data Mining (NGDM), 2002, pp. 21-30.
- T. Fawcett, "An Introduction to ROC Analysis," Pattern Recog. Lett., vol. 27, no. 8, 2006, pp. 861-874. https://doi.org/10.1016/j.patrec.2005.10.010
- G. Liu and Z. Yi, "Intrusion Detection Using PCASOM Neural Networks," Advances in Neural Networks - ISNN 2006, J. Wang et al., Eds., Berlin/Heidelberg: Springer-Verlag, 2006, pp. 240-245.
- I. Ahmad et al., "Optimized Intrusion Detection Mechanism Using Soft Computing Techniques," Telecommun. Syst., 2011, doi: 10.1007/s11235-011-9541-1.
- H. Abbasian et al., "Class Dependent LDA Optimization Using Genetic Algorithm for Robust MFCC Extraction," Adv. Computer Sci. Eng., vol. 6, 2009, pp. 807-810.
- J.C. Dunn, "Well-Separated Clusters and Optimal Fuzzy Partitions," J. Cybern., vol. 4, no. 1, 1974, pp. 95-104. https://doi.org/10.1080/01969727408546059
- M. Halkidi, M. Vazirgiannis, and Y. Batistakis, "Quality Scheme Assessment in the Clustering Process," Proc. 4th European Conf. Principles Data Mining Knowledge Discovery, LNCS, vol. 1910, 2000, pp. 265-276.
Cited by
- Performance of vehicle speed estimation using wireless sensor networks: a region-based approach vol.71, pp.6, 2012, https://doi.org/10.1007/s11227-014-1306-7