作者: Zulaiha Ali Othman , Azuraliza Abu Bakar , Intesar Etubal
DOI: 10.1109/ISDA.2010.5687051
关键词: Feature extraction 、 Computer science 、 Constant false alarm rate 、 Pattern recognition 、 Data modeling 、 False alarm 、 Artificial intelligence 、 Hidden Markov model 、 Decision tree 、 Data pre-processing 、 Data mining 、 Intrusion detection system
摘要: … model by applying the features extraction based customized features. The customized … the signature model by performing the GA selection features based on customized features. The …