An efficient feature selection based Bayesian and Rough set approach for intrusion detection

M Prasad, S Tripathi, K Dahal - Applied Soft Computing, 2020 - Elsevier
The exponential growth of network size leads to increase attacks and intrusions. Detection of
these attacks from the network has turned into a noteworthy issue of security. An intrusion …

Unsupervised feature selection and cluster center initialization based arbitrary shaped clusters for intrusion detection

M Prasad, S Tripathi, K Dahal - Computers & Security, 2020 - Elsevier
The massive growth of data in the network leads to attacks or intrusions. An intrusion
detection system detects intrusions from high volume datasets but increases complexities. A …

Third order backward elimination approach for fuzzy-rough set based feature selection

S Ghosh, P Sai Prasad, CR Rao - International Conference on Pattern …, 2017 - Springer
Two important control strategies for Rough Set based reduct computation are Sequential
Forward Selection (SFS), and Sequential Backward Elimination (SBE). SBE methods have …

Kernel neighborhood rough sets model and its application

K Zeng, S Jing - Complexity, 2018 - Wiley Online Library
Rough set theory has been successfully applied to many fields, such as data mining, pattern
recognition, and machine learning. Kernel rough sets and neighborhood rough sets are two …

[PDF][PDF] Deceit Detection Using Metaheuristics, Fuzzy Sets and Machine Learning

C Li - users.cecs.anu.edu.au
This paper firstly uses logistic regression and Stochastic Gates to roughly estimate the deceit
prediction accuracy and then investigates feature selection methods like meta-heuristic and …

[PDF][PDF] Novel feature selection methods and BDNN for Deceit Detection

C Li - users.cecs.anu.edu.au
This paper investigates some novel feature selection methods such as Stochastic Gates,
LassoNet and Fuzzy Roguh Sets to fetch appropriate features for deceit detection, designing …