This research proposes several methods designed to improve solutions for security classification problems. The security classification problem involves unbalanced, high-dimensional, binary classification problems that are prevalent today. The imbalance within this data involves a significant majority of the negative class and a minority positive class. Any system that needs protection from malicious activity, intruders, theft, or other types of breaches in security must address this problem. These breaches in security are considered instances of the positive class. Given numerical data that represent observations or instances which require classification, state of the art machine learning algorithms can be applied. However, the unbalanced a...
Despite the considerable academic interest in using machine learning methods to detect cyber attacks...
Most defence mechanisms such as a network-based intrusion detection system (NIDS) are often sub-opti...
In recent years several tools based on statistical meth-ods and machine learning have been incorpora...
The evaluation and learning of classifiers is of particular importance in several computer security ...
Abstract. This paper proposes a novel method for unsupervised en-sembles that specifically addresses...
Abstract. This paper proposes a novel method for unsupervised ensembles that specifically addresses ...
Information security is very important in today’s society. Computer intrusion is one type of securit...
This paper proposes a novel method of fusing models for classification of unbalanced data. The unbal...
The evaluation and learning of classifiers is of particular importance in several computer security ...
The escalation of hazards to safety and hijacking of digital networks are among the strongest perilo...
Statistical Machine Learning is used in many real-world systems, such as web search, network and pow...
Intrusion Detection Systems (IDS) nowadays are a very important part of a system. In the last years ...
Security of innovative technologies in future generation networks such as (Cyber Physical Systems (C...
With massive data being generated daily and the ever-increasing interconnectivity of the world’s Int...
Research into the use of machine learning techniques for network intrusion detection, especially car...
Despite the considerable academic interest in using machine learning methods to detect cyber attacks...
Most defence mechanisms such as a network-based intrusion detection system (NIDS) are often sub-opti...
In recent years several tools based on statistical meth-ods and machine learning have been incorpora...
The evaluation and learning of classifiers is of particular importance in several computer security ...
Abstract. This paper proposes a novel method for unsupervised en-sembles that specifically addresses...
Abstract. This paper proposes a novel method for unsupervised ensembles that specifically addresses ...
Information security is very important in today’s society. Computer intrusion is one type of securit...
This paper proposes a novel method of fusing models for classification of unbalanced data. The unbal...
The evaluation and learning of classifiers is of particular importance in several computer security ...
The escalation of hazards to safety and hijacking of digital networks are among the strongest perilo...
Statistical Machine Learning is used in many real-world systems, such as web search, network and pow...
Intrusion Detection Systems (IDS) nowadays are a very important part of a system. In the last years ...
Security of innovative technologies in future generation networks such as (Cyber Physical Systems (C...
With massive data being generated daily and the ever-increasing interconnectivity of the world’s Int...
Research into the use of machine learning techniques for network intrusion detection, especially car...
Despite the considerable academic interest in using machine learning methods to detect cyber attacks...
Most defence mechanisms such as a network-based intrusion detection system (NIDS) are often sub-opti...
In recent years several tools based on statistical meth-ods and machine learning have been incorpora...