Pairwise Classification as an Ensemble Technique
ECML '02 Proceedings of the 13th European Conference on Machine Learning
Wrapping Boosters against Noise
AI '01 Proceedings of the 14th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
The Journal of Machine Learning Research
Speeding up the Self-Organizing Feature Map Using Dynamic Subset Selection
Neural Processing Letters
Decision tree classifier for network intrusion detection with GA-based feature selection
Proceedings of the 43rd annual Southeast regional conference - Volume 2
A hierarchical SOM-based intrusion detection system
Engineering Applications of Artificial Intelligence
A three-tier IDS via data mining approach
Proceedings of the 3rd annual ACM workshop on Mining network data
Intelligent Data Analysis
An efficient intrusion detection system using a boosting-based learning algorithm
International Journal of Computer Applications in Technology
Indirect classification approaches: a comparative study in network intrusion detection
International Journal of Computer Applications in Technology
An adaptive automatically tuning intrusion detection system
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Non-stationary Data Mining: The Network Security Issue
ICANN '08 Proceedings of the 18th international conference on Artificial Neural Networks, Part II
An investigation of Zipf's Law for fraud detection (DSS#06-10-1826R(2))
Decision Support Systems
Enhancing network based intrusion detection for imbalanced data
International Journal of Knowledge-based and Intelligent Engineering Systems
A New Data-Mining Based Approach for Network Intrusion Detection
CNSR '09 Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference
Interactive Visualization of Network Anomalous Events
ICCS '09 Proceedings of the 9th International Conference on Computational Science: Part I
Adaptive Distributed Intrusion Detection Using Parametric Model
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01
Computational Statistics & Data Analysis
Unsupervised active learning based on hierarchical graph-theoretic clustering
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Information Sciences: an International Journal
A linear genetic programming approach to intrusion detection
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartII
A novel intrusion detection system based on hierarchical clustering and support vector machines
Expert Systems with Applications: An International Journal
Expert Systems with Applications: An International Journal
Mutual information-based feature selection for intrusion detection systems
Journal of Network and Computer Applications
Clustering and classification based anomaly detection
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
Fuzzy model tuning for intrusion detection systems
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Using data field to analyze network intrusions
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Detecting novel network attacks with a data field
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
Hi-index | 0.00 |
We briefly describe our approach for the KDD99 Classification Cup. The solution is essentially a mixture of bagging and boosting. Additionally, asymmetric error costs are taken into account by minimizing the so-called conditional risk. Furthermore, the standard sampling with replacement methodology of bagging was modified to put a specific focus on the smaller but expensive-if-predicted-wrongly classes.