Affiliation:
1. Korea Advanced Institute of Science and Technology (KAIST)
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference19 articles.
1. [1] C. Kolias, G. Kambourakis, and M. Maragoudakis, “Swarm intelligence in intrusion detection: A survey,” Comput. Secur., vol.30, no.8, pp.625-642, 2011.
2. [2] P. Laskov, P. Düssel, C. Schäfer, and K. Rieck, “Learning intrusion detection: Supervised or unsupervised?,” Image Analysis and Processing, ICIAP 2005, Lecture Notes in Computer Science, vol.3617, pp.50-57, Springer Berlin Heidelberg, Berlin, Heidelberg, 2005.
3. [3] S. Zanero and S.M. Savaresi, “Unsupervised learning techniques for an intrusion detection system,” Proc. 2004 ACM Symposium on Applied Computing, SAC'04, pp.412-419, 2004.
4. [4] C.-H. Tsang and S. Kwong, “Ant colony clustering and feature extraction for anomaly intrusion detection,” Swarm Intelligence in Data Mining, Studies in Computational Intelligence, vol.34, pp.101-123, Springer Berlin Heidelberg, Berlin, Heidelberg, 2006.
5. [5] A. Karami and M. Guerrero-Zapata, “A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks,” Neurocomputing, vol.149, pp.1253-1269, 2015.
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献