최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국해양정보통신학회논문지 = The journal of the Korea Institute of Maritime Information & Communication Sciences, v.9 no.1, 2005년, pp.40 - 44
Applying artificial intelligence, machine learning and data mining techniques to intrusion detection system are increasing. But most of researches are focused on improving the performance of classifier. These classifiers are performed by batch way and it is not proper method for realtime intrusion d...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
A.H. Sung, and S. Mukkamala, 'Identifyi- ng Important Features for Intrusion Detection Using Support Vector Machines and Neu-ral Networks,' Proceedings of the 2003 Sy-mposium on Applications and the Internet, 2003
Nong Ye, 'A Scalable Clustering Techni- que for Intrusion Signature Recognition,' Proceedings of the 2001 IEEE Workshop on Information Assurance and Security. 2001
Leonid Portnoy, 'Intrusion detection with unlabeled data using cluster ' Undergr-aduate thesis, Columbia University
LT. Jolliffe,. 'Principal Component Analy -sis,' New York Springer-Verlag, 1986
J.A.K. Suykens, and J. Vandewalle, 'Least squares support vector machine classifiers,' Neural Processing Letters, vol.9, (1999)
J. Liu, J. Chen, S. Jiang and J. Cheng, 'Online LS-SVM for function estimation and classification,' Journal of Univ. of Science and Tech. Beijing. Vol.10, Num. 5, Oct. 2003
Accessible at http://kdd.ics.uci.edu/datab ases/kddcup99/kddcup99.html
Accessible at http://www-cse.ucsd.edu/us ets]elkan/clresults.html
※ AI-Helper는 부적절한 답변을 할 수 있습니다.