Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Modeling and Simulation,Information Systems,Signal Processing,Theoretical Computer Science,Control and Systems Engineering
Reference53 articles.
1. Intrusion Detection Evaluation Dataset (CIC-IDS2017). [Online; accessed 22-September-2021].
2. Anton, S. D. D., Sinha, S., & Schotten, H. D. (2019). Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests. arXiv:19087.10374 [cs]
3. Atkins, D., Neshatian, K., & Zhang, M. (2011). A domain independent genetic programming approach to automatic feature extraction for image classification. In 2011 IEEE Congress of Evolutionary Computation (CEC), pages 238–245. IEEE.
4. Bellemare, M. G., Naddaf, Y., Veness, J., & Bowling, M. (2013). The arcade learning environment: An evaluation platform for general agents. Journal of Artificial Intelligence Research, 47, 253–279.
5. Cannady, J. (2000). Next Generation Intrusion Detection: Autonomous Reinforcement Learning of Network Attacks. p. 12.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Evolutionary Ensemble Learning;Handbook of Evolutionary Machine Learning;2023-11-02
2. Explainable Artificial Intelligence by Genetic Programming: A Survey;IEEE Transactions on Evolutionary Computation;2022