Obserwuj
Malcolm Heywood
Malcolm Heywood
Professor, Computer Science, Dalhousie University
Zweryfikowany adres z cs.dal.ca
Tytuł
Cytowane przez
Cytowane przez
Rok
Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings of the third annual conference on privacy, security and trust 94 …, 2005
5502005
On the capability of an SOM based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Proceedings of the International Joint Conference on Neural Networks, 2003 …, 2003
2282003
A hierarchical SOM-based intrusion detection system
HG Kayacik, AN Zincir-Heywood, MI Heywood
Engineering applications of artificial intelligence 20 (4), 439-451, 2007
2172007
Host-based intrusion detection using self-organizing maps
P Lichodzijewski, AN Zincir-Heywood, MI Heywood
Proceedings of the 2002 International Joint Conference on Neural Networks …, 2002
2042002
Training genetic programming on half a million patterns: an example from anomaly detection
D Song, MI Heywood, AN Zincir-Heywood
IEEE transactions on evolutionary computation 9 (3), 225-239, 2005
1982005
Comparing and combining dimension reduction techniques for efficient text clustering
B Tang, M Shepherd, E Milios, MI Heywood
Proceeding of SIAM international workshop on feature selection for data …, 2005
1182005
Dynamic intrusion detection using self-organizing maps
P Lichodzijewski, AN Zincir-Heywood, MI Heywood
The 14th Annual Canadian Information Technology Security Symposium (CITSS), 1-5, 2002
1072002
Analyzing data granularity levels for insider threat detection using machine learning
DC Le, N Zincir-Heywood, MI Heywood
IEEE Transactions on Network and Service Management 17 (1), 30-44, 2020
1022020
UV microstereolithography system that uses spatial light modulator technology
C Chatwin, M Farsari, S Huang, M Heywood, P Birch, R Young, ...
Applied optics 37 (32), 7514-7522, 1998
911998
A linear genetic programming approach to intrusion detection
D Song, MI Heywood, AN Zincir-Heywood
Genetic and Evolutionary Computation—GECCO 2003: Genetic and Evolutionary …, 2003
832003
GP classification under imbalanced data sets: Active sub-sampling and AUC approximation
J Doucette, MI Heywood
European Conference on Genetic Programming, 266-277, 2008
762008
Input partitioning to mixture of experts
B Tang, MI Heywood, M Shepherd
Proceedings of the 2002 International Joint Conference on Neural Networks …, 2002
762002
Managing team-based problem solving with symbiotic bid-based genetic programming
P Lichodzijewski, MI Heywood
Proceedings of the 10th annual conference on Genetic and evolutionary …, 2008
742008
Dynamic page based crossover in linear genetic programming
MI Heywood, AN Zincir-Heywood
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 32 …, 2002
592002
Symbiosis, complexification and simplicity under GP
P Lichodzijewski, MI Heywood
Proceedings of the 12th annual conference on Genetic and evolutionary …, 2010
552010
Comparing dimension reduction techniques for document clustering
B Tang, M Shepherd, MI Heywood, X Luo
Advances in Artificial Intelligence: 18th Conference of the Canadian Society …, 2005
552005
Comparing dimension reduction techniques for document clustering
B Tang, M Shepherd, MI Heywood, X Luo
Advances in Artificial Intelligence: 18th Conference of the Canadian Society …, 2005
552005
Scaling genetic programming to large datasets using hierarchical dynamic subset selection
R Curry, P Lichodzijewski, MI Heywood
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 37 …, 2007
522007
On botnet detection with genetic programming under streaming data, label budgets and class imbalance
S Khanchi, A Vahdat, MI Heywood, AN Zincir-Heywood
Proceedings of the Genetic and Evolutionary Computation Conference Companion …, 2018
512018
Data analytics on network traffic flows for botnet behaviour detection
DC Le, AN Zincir-Heywood, MI Heywood
2016 IEEE symposium series on computational intelligence (SSCI), 1-7, 2016
502016
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20