Hierarchical Core Vector Machines for Network Intrusion Detection.
Ye ChenShaoning PangNikola K. KasabovTao BanYouki KadobayashiPublished in: ICONIP (2) (2009)
Keyphrases
- learning process
- network intrusion detection
- intrusion detection
- anomaly detection
- network intrusion
- network anomaly detection
- artificial immune
- fraud detection
- intrusion detection system
- network traffic
- network attacks
- network traffic data
- outlier detection
- databases
- unsupervised learning
- classification accuracy
- reinforcement learning
- bayesian networks
- real world