Survey of network intrusion detection methods from the perspective of the knowledge discovery in databases process
B Molina-Coronado, U Mori… - … on Network and …, 2020 - ieeexplore.ieee.org
The identification of network attacks which target information and communication systems
has been a focus of the research community for years. Network intrusion detection is a …
has been a focus of the research community for years. Network intrusion detection is a …
Big-data analysis, cluster analysis, and machine-learning approaches
A Alonso-Betanzos, V Bolón-Canedo - Sex-specific analysis of …, 2018 - Springer
Medicine will experience many changes in the coming years because the so-called
“medicine of the future” will be increasingly proactive, featuring four basic elements …
“medicine of the future” will be increasingly proactive, featuring four basic elements …
Feature selection for high-dimensional data
V Bolón-Canedo, N Sánchez-Maroño… - Progress in Artificial …, 2016 - Springer
This paper offers a comprehensive approach to feature selection in the scope of
classification problems, explaining the foundations, real application problems and the …
classification problems, explaining the foundations, real application problems and the …
Data mining: practical machine learning tools and techniques with Java implementations
Witten and Frank's textbook was one of two books that 1 used for a data mining class in the
Fall of 2001. The book covers all major methods of data mining that produce a knowledge …
Fall of 2001. The book covers all major methods of data mining that produce a knowledge …
[PDF][PDF] Practical machine learning tools and techniques
Data Mining Page 1 Data Mining Practical Machine Learning Tools and Techniques Third
Edition Ian H. Witten Eibe Frank Mark A. Hall ELSEVIER AMSTERDAM • BOSTON • …
Edition Ian H. Witten Eibe Frank Mark A. Hall ELSEVIER AMSTERDAM • BOSTON • …
A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier
L Koc, TA Mazzuchi, S Sarkani - Expert Systems with Applications, 2012 - Elsevier
With increasing Internet connectivity and traffic volume, recent intrusion incidents have
reemphasized the importance of network intrusion detection systems for combating …
reemphasized the importance of network intrusion detection systems for combating …
Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset
V Bolon-Canedo, N Sanchez-Marono… - Expert Systems with …, 2011 - Elsevier
In this work, a new method consisting of a combination of discretizers, filters and classifiers
is presented. Its aim is to improve the performance results of classifiers but using a …
is presented. Its aim is to improve the performance results of classifiers but using a …
Discretization for naive-Bayes learning: managing discretization bias and variance
Quantitative attributes are usually discretized in Naive-Bayes learning. We establish simple
conditions under which discretization is equivalent to use of the true probability density …
conditions under which discretization is equivalent to use of the true probability density …
[PDF][PDF] A comparative study of discretization methods for naive-bayes classifiers
Discretization is a popular approach to handling numeric attributes in machine learning. We
argue that the requirements for effective discretization differ between naive-Bayes learning …
argue that the requirements for effective discretization differ between naive-Bayes learning …
BN-SLIM: A Bayesian Network methodology for human reliability assessment based on Success Likelihood Index Method (SLIM)
Abstract Success Likelihood Index Model (SLIM) is one of the widely-used deterministic
techniques in human reliability assessment especially when data is insufficient. However …
techniques in human reliability assessment especially when data is insufficient. However …