Computer systems that learn: classification and prediction methods from statistics, neural nets, machine learning, and expert systems
C4.5: programs for machine learning
C4.5: programs for machine learning
A survey of intrusion detection techniques
Computers and Security
The nature of statistical learning theory
The nature of statistical learning theory
Advances in knowledge discovery and data mining
Advances in knowledge discovery and data mining
On the Optimality of the Simple Bayesian Classifier under Zero-One Loss
Machine Learning - Special issue on learning with probabilistic representations
Fast training of support vector machines using sequential minimal optimization
Advances in kernel methods
Machine Learning
Mathematical Programming for Data Mining: Formulations and Challenges
INFORMS Journal on Computing
Machine learning and data mining via mathematical programming-based support vector machines
Machine learning and data mining via mathematical programming-based support vector machines
Multicategory Proximal Support Vector Machine Classifiers
Machine Learning
Data Mining: Concepts and Techniques
Data Mining: Concepts and Techniques
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition (Morgan Kaufmann Series in Data Management Systems)
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Rough set based 1-v-1 and 1-v-r approaches to support vector machine multi-classification
Information Sciences: an International Journal
A hybrid machine learning approach to network anomaly detection
Information Sciences: an International Journal
A Multi-criteria Convex Quadratic Programming model for credit data analysis
Decision Support Systems
Hierarchical multi-pattern matching algorithm for network content inspection
Information Sciences: an International Journal
A multiple-criteria quadratic programming approach to network intrusion detection
CASDMKM'04 Proceedings of the 2004 Chinese academy of sciences conference on Data Mining and Knowledge Management
A comparison of methods for multiclass support vector machines
IEEE Transactions on Neural Networks
Linear programming method for multiattribute group decision making using IF sets
Information Sciences: an International Journal
Information Sciences: an International Journal
Time-series forecasting using a system of ordinary differential equations
Information Sciences: an International Journal
Rule Extraction from Support Vector Machines and Its Applications
WI-IAT '11 Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 03
A non-functional requirements tradeoff model in Trustworthy Software
Information Sciences: an International Journal
An integrated risk measurement and optimization model for trustworthy software process management
Information Sciences: an International Journal
HIS'12 Proceedings of the First international conference on Health Information Science
Decision Rule Extraction for Regularized Multiple Criteria Linear Programming Model
International Journal of Data Warehousing and Mining
Opcode sequences as representation of executables for data-mining-based unknown malware detection
Information Sciences: an International Journal
idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining
Information Sciences: an International Journal
A vector-valued support vector machine model for multiclass problem
Information Sciences: an International Journal
Computers and Operations Research
Hi-index | 0.07 |
Multi-class classification problems are harder to solve and less studied than binary classification problems. The goal of this paper is to present a multi-criteria mathematical programming (MCMP) model for multi-class classification. Furthermore, we introduce the concept of e-support vector to facilitate computation of large-scale applications. Instead of finding the optimal solution for a convex mathematical programming problem, the computation of optimal solution for the model requires only matrix computation. Using two network intrusion datasets, we demonstrate that the proposed model can achieve both high classification accuracies and low false alarm rates for multi-class network intrusion classification.