2013
DOI: 10.2481/dsj.wds-045
|View full text |Cite
|
Sign up to set email alerts
|

A Data-Driven Method for Selecting Optimal Models Based on Graphical Visualisation of Differences in Sequentially Fitted ROC Model Parameters

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…That is, combining the power of automated learning techniques (via objectives 1, 2 and 3) and existing domain knowledge (via objectives 2, 3 and 4) to uncover networks intrusion empowers the method to learn concept rules from highly masked to highly spurious cases while observing model robustness. No existing work provides such a robust generalisations on variations due to data randomness, a welldocumented challenge in data science as reported Bridges et al [14], Mwitondi et al [3] and Mwitondi and Said [9]. Finally, from an intrusion detection perspective, normal and malicious flows do not fit in any current concept definition across tools.…”
Section: Main Contributionmentioning
confidence: 99%
See 2 more Smart Citations
“…That is, combining the power of automated learning techniques (via objectives 1, 2 and 3) and existing domain knowledge (via objectives 2, 3 and 4) to uncover networks intrusion empowers the method to learn concept rules from highly masked to highly spurious cases while observing model robustness. No existing work provides such a robust generalisations on variations due to data randomness, a welldocumented challenge in data science as reported Bridges et al [14], Mwitondi et al [3] and Mwitondi and Said [9]. Finally, from an intrusion detection perspective, normal and malicious flows do not fit in any current concept definition across tools.…”
Section: Main Contributionmentioning
confidence: 99%
“…Their algorithm relies heavily on the distributional assumption that the data are sampled from a known distribution. However, Mwitondi et al [3] show that even with a reasonable consideration of probability distribution of the data and the bounding likelihood of an anomaly, challenges relating to data and model randomness remain. Here it suffices to first recognise that the parameters used in the fitting and, hence, computation of Ψ in Equation 6 are data-dependent.…”
Section: A Bayesian Approach To Supervised Modellingmentioning
confidence: 99%
See 1 more Smart Citation
“…For the active data, we explore various values of the methods' smoothing parameter to provide different sizes of the neighbourhood to minimise the effect of different types of randomness on the results [19,20]. With Loess-Local Regression, we fit multiple regressions in local neighborhoods of the radon flow from the active detector.…”
Section: Implementation Strategymentioning
confidence: 99%
“…Data sampling, randomness, multicollinearity, missing data and outliers are some of the main issues which data analysts have to deal with in their quest to attain modelling accuracy and reliability. Many have been widely studied and documented-see, for instance, [12,13] & [14]. The need for flexible and adaptive security oriented approaches to intrusion detection has triggered a growing interest in computational intelligence methods-artificial neural networks, fuzzy systems, evolutionary computation, artificial immune systems, swarm intelligence and soft computing [1].…”
Section: Introductionmentioning
confidence: 99%