The nature of statistical learning theory
The nature of statistical learning theory
Towards a taxonomy of intrusion-detection systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
An introduction to intrusion detection
Crossroads - Special issue on computer security
A Tutorial on Support Vector Machines for Pattern Recognition
Data Mining and Knowledge Discovery
The Kernel-Adatron Algorithm: A Fast and Simple Learning Procedure for Support Vector Machines
ICML '98 Proceedings of the Fifteenth International Conference on Machine Learning
Evolutionary Optimization Versus Particle Swarm Optimization: Philosophy and Performance Differences
EP '98 Proceedings of the 7th International Conference on Evolutionary Programming VII
Machine learning techniques for the computer security domain of anomaly detection
Machine learning techniques for the computer security domain of anomaly detection
Application of SVM and ANN for intrusion detection
Computers and Operations Research
To identify suspicious activity in anomaly detection based on soft computing
AIA'06 Proceedings of the 24th IASTED international conference on Artificial intelligence and applications
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Intrusion detection system based on multi-class SVM
RSFDGrC'05 Proceedings of the 10th international conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing - Volume Part II
Hi-index | 0.00 |
We consider the design of optimum ISI-free, discrete multitone transmission (DMT) systems designed to achieve a quality of service (QoS) requirement quantified by bit rate and symbol error rate specifications. The optimality is in the sense of minimizing ...