Instance-Based Learning Algorithms
Machine Learning
Handwritten numerical recognition based on multiple algorithms
Pattern Recognition
Original Contribution: Stacked generalization
Neural Networks
C4.5: programs for machine learning
C4.5: programs for machine learning
Methods for combining experts' probability assessments
Neural Computation
On the Accuracy of Meta-learning for Scalable Data Mining
Journal of Intelligent Information Systems
On the Optimality of the Simple Bayesian Classifier under Zero-One Loss
Machine Learning - Special issue on learning with probabilistic representations
Soft combination of neural classifiers: a comparative study
Pattern Recognition Letters
Statistical Pattern Recognition: A Review
IEEE Transactions on Pattern Analysis and Machine Intelligence
On the Algorithmic Implementation of Stochastic Discrimination
IEEE Transactions on Pattern Analysis and Machine Intelligence
An approach to the automatic design of multiple classifier systems
Pattern Recognition Letters - Special issue on machine learning and data mining in pattern recognition
ACM Transactions on Information and System Security (TISSEC)
Machine Learning
IEEE Transactions on Pattern Analysis and Machine Intelligence
Classification by Voting Feature Intervals
ECML '97 Proceedings of the 9th European Conference on Machine Learning
Improved Pairwise Coupling Classification with Correcting Classifiers
ECML '98 Proceedings of the 10th European Conference on Machine Learning
On the Decomposition of Polychotomies into Dichotomies
ICML '97 Proceedings of the Fourteenth International Conference on Machine Learning
Aggregation and Correlation of Intrusion-Detection Alerts
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Ensemble Methods in Machine Learning
MCS '00 Proceedings of the First International Workshop on Multiple Classifier Systems
MCS '00 Proceedings of the First International Workshop on Multiple Classifier Systems
Complexity of Data Subsets Generated by the Random Subspace Method: An Experimental Investigation
MCS '01 Proceedings of the Second International Workshop on Multiple Classifier Systems
Genetic Programming for Improved Receiver Operating Characteristics
MCS '01 Proceedings of the Second International Workshop on Multiple Classifier Systems
MCS '02 Proceedings of the Third International Workshop on Multiple Classifier Systems
Reducing multiclass to binary: a unifying approach for margin classifiers
The Journal of Machine Learning Research
Clustering intrusion detection alarms to support root cause analysis
ACM Transactions on Information and System Security (TISSEC)
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
Model selection for medical diagnosis decision support systems
Decision Support Systems
Combining Pattern Classifiers: Methods and Algorithms
Combining Pattern Classifiers: Methods and Algorithms
Data mining in metric space: an empirical analysis of supervised learning performance criteria
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Intrusion Detection and Correlation: Challenges and Solutions
Intrusion Detection and Correlation: Challenges and Solutions
Intrusion detection using an ensemble of intelligent paradigms
Journal of Network and Computer Applications - Special issue on computational intelligence on the internet
Pattern Recognition and Machine Learning (Information Science and Statistics)
Pattern Recognition and Machine Learning (Information Science and Statistics)
An analysis of diversity measures
Machine Learning
A Comparison of Decision Tree Ensemble Creation Techniques
IEEE Transactions on Pattern Analysis and Machine Intelligence
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition (Morgan Kaufmann Series in Data Management Systems)
Hybrid flexible neural-tree-based intrusion detection systems: Research Articles
International Journal of Intelligent Systems
Modeling intrusion detection system using hybrid intelligent systems
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Selective fusion of heterogeneous classifiers
Intelligent Data Analysis
Statistical Comparisons of Classifiers over Multiple Data Sets
The Journal of Machine Learning Research
Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection
CNSR '07 Proceedings of the Fifth Annual Conference on Communication Networks and Services Research
A three-tier IDS via data mining approach
Proceedings of the 3rd annual ACM workshop on Mining network data
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Computer Networks: The International Journal of Computer and Telecommunications Networking
Data-driven decomposition for multi-class classification
Pattern Recognition
A new intrusion detection system using support vector machines and hierarchical clustering
The VLDB Journal — The International Journal on Very Large Data Bases
A 'No Panacea Theorem' for classifier combination
Pattern Recognition
Detection of unknown computer worms based on behavioral classification of the host
Computational Statistics & Data Analysis
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
A Comparative Study of Data Mining Algorithms for Network Intrusion Detection
ICETET '08 Proceedings of the 2008 First International Conference on Emerging Trends in Engineering and Technology
CMC '09 Proceedings of the 2009 WRI International Conference on Communications and Mobile Computing - Volume 03
Information fusion for computer security: State of the art and open issues
Information Fusion
Machine Learning: An Algorithmic Perspective
Machine Learning: An Algorithmic Perspective
Computational Statistics & Data Analysis
Troika - An improved stacking schema for classification tasks
Information Sciences: an International Journal
Bundling classifiers by bagging trees
Computational Statistics & Data Analysis
A multi-model approach to the detection of web-based attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Alarm clustering for intrusion detection systems in computer networks
Engineering Applications of Artificial Intelligence
Introduction to Machine Learning
Introduction to Machine Learning
Data dependence in combining classifiers
MCS'03 Proceedings of the 4th international conference on Multiple classifier systems
A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering
Expert Systems with Applications: An International Journal
HMM-web: a framework for the detection of attacks against web applications
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Error-correcting output codes: a general method for improving multiclass inductive learning programs
AAAI'91 Proceedings of the ninth National conference on Artificial intelligence - Volume 2
The use of artificial intelligence based techniques for intrusion detection: a review
Artificial Intelligence Review
Intrusion detection using neural based hybrid classification methods
Computer Networks: The International Journal of Computer and Telecommunications Networking
AI based supervised classifiers: an analysis for intrusion detection
ACAI '11 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
Adaptive ROC-based ensembles of HMMs applied to anomaly detection
Pattern Recognition
Estimating continuous distributions in Bayesian classifiers
UAI'95 Proceedings of the Eleventh conference on Uncertainty in artificial intelligence
Evolving artificial neural network ensembles
IEEE Computational Intelligence Magazine
AdaBoost-Based Algorithm for Network Intrusion Detection
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Application of majority voting to pattern recognition: an analysis of its behavior and performance
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
An information theoretic approach for feature selection
Security and Communication Networks
Efficient classification for multiclass problems using modular neural networks
IEEE Transactions on Neural Networks
Hi-index | 0.00 |
In supervised learning-based classification, ensembles have been successfully employed to different application domains. In the literature, many researchers have proposed different ensembles by considering different combination methods, training datasets, base classifiers, and many other factors. Artificial-intelligence-(AI-) based techniques play prominent role in development of ensemble for intrusion detection (ID) and have many benefits over other techniques. However, there is no comprehensive review of ensembles in general and AI-based ensembles for ID to examine and understand their current research status to solve the ID problem. Here, an updated review of ensembles and their taxonomies has been presented in general. The paper also presents the updated review of various AI-based ensembles for ID (in particular) during last decade. The related studies of AI-based ensembles are compared by set of evaluation metrics driven from (1) architecture & approach followed; (2) different methods utilized in different phases of ensemble learning; (3) other measures used to evaluate classification performance of the ensembles. The paper also provides the future directions of the research in this area. The paper will help the better understanding of different directions in which research of ensembles has been done in general and specifically: field of intrusion detection systems (IDSs).