The nature of statistical learning theory
The nature of statistical learning theory
An introduction to intrusion detection
Crossroads - Special issue on computer security
A Tutorial on Support Vector Machines for Pattern Recognition
Data Mining and Knowledge Discovery
Rough set methods in feature selection and recognition
Pattern Recognition Letters - Special issue: Rough sets, pattern recognition and data mining
Machine learning techniques for the computer security domain of anomaly detection
Machine learning techniques for the computer security domain of anomaly detection
A Fuzzy Data Mining Based Intrusion Detection Model
FTDCS '04 Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems
Application of SVM and ANN for intrusion detection
Computers and Operations Research
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Intrusion detection system based on multi-class SVM
RSFDGrC'05 Proceedings of the 10th international conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing - Volume Part II
An immunity-based technique to characterize intrusions in computernetworks
IEEE Transactions on Evolutionary Computation
Hi-index | 0.00 |
Intrusion detection is the art of detecting unauthorized, inappropriate, or anomalous activity on computer systems. Independent component analysis (ICA) aims at extracting unknown hidden factors/components from multivariate data using only the assumption that unknown factors are mutually independent. In this paper it discuss an intrusion detection method that proposes independent component analysis based feature selection heuristics and using support vector machine for classification data. The experimental results on Knowledge Discovery and Data Mining-(KDDCup 1999) dataset.