1994
DOI: 10.1109/65.283931
|View full text |Cite
|
Sign up to set email alerts
|

Network intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
325
0
7

Year Published

2002
2002
2022
2022

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 771 publications
(332 citation statements)
references
References 13 publications
0
325
0
7
Order By: Relevance
“…, (x m , y m ), where x i ∈ R n is an input vector labeled by y i ∈ {+1, −1}. For many applications, such as network intrusion detection (Mukherjee et al 1994), disease diagnosis (Christodoulou and Pattichis 1999), handwritten character recognition (Veeramachaneni and Nagy 2005), and human face detection (Osuna et al 1997), data do appear in homogeneous groups. If the data structural information can be appropriately utilized to facilitate the classifier training, there will be a significant classification accuracy improvement.…”
Section: Introductionmentioning
confidence: 99%
“…, (x m , y m ), where x i ∈ R n is an input vector labeled by y i ∈ {+1, −1}. For many applications, such as network intrusion detection (Mukherjee et al 1994), disease diagnosis (Christodoulou and Pattichis 1999), handwritten character recognition (Veeramachaneni and Nagy 2005), and human face detection (Osuna et al 1997), data do appear in homogeneous groups. If the data structural information can be appropriately utilized to facilitate the classifier training, there will be a significant classification accuracy improvement.…”
Section: Introductionmentioning
confidence: 99%
“…While there are many applications based on group communication and topic-based pub/sub protocols such as information dissemination [17,22], a large variety of emerging applications benefit from the expressiveness, filtering, distributed event correlation, and complex event processing capabilities of content-based pub/sub. These applications include RSS feed filtering [31], stock-market monitoring engines [33], system and network management and monitoring [7,20], algorithmic trading with complex event processing [10,29], business process execution [32], business activity monitoring [7] and workflow management [5]. Typically, content-based pub/sub systems are built as application-level overlays of content-based pub/sub brokers, with publishing data sources and subscribing data sinks connecting to the broker overlay as clients.…”
Section: Introductionmentioning
confidence: 99%
“…Among these, computer science has made significant advances with biologically inspired theories fitted in every branch. The typical bio-inspired systems are artificial neural networks, evolutionary computation, DNA computation, and now artificial immune systems (AIS) [2].…”
Section: Introductionmentioning
confidence: 99%