Supervised, Unsupervised, and Semi-Supervised Feature Selection: A Review on Gene Selection, IEEE/ACM Transactions on Computational Biology and Bioinformatics, vol.13, issue.5, pp.971-989, 2016. ,
DOI : 10.1109/TCBB.2015.2478454
Large-scale network traffic monitoring with DBStream, a system for rolling big data analysis, 2014 IEEE International Conference on Big Data (Big Data), pp.165-170, 2014. ,
DOI : 10.1109/BigData.2014.7004227
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection, IEEE Communications Surveys & Tutorials, vol.18, issue.2, pp.1-26, 2015. ,
DOI : 10.1109/COMST.2015.2494502
A survey on feature selection methods, Computers & Electrical Engineering, vol.40, issue.1, pp.16-28, 2014. ,
DOI : 10.1016/j.compeleceng.2013.11.024
Gene selection for cancer classification using support vector machines, Machine learning, vol.46, pp.1-3389, 2002. ,
Correlation-based Feature Selection for Machine Learning, 1999. ,
Uses and challenges for network datasets. Em Conference For Homeland Security, 2009. CATCH'09, Cybersecurity Applications & Technology, pp.73-82, 2009. ,
DOI : 10.1109/catch.2009.29
Dynamic defense strategy against advanced persistent threat with insiders, 2015 IEEE Conference on Computer Communications (INFOCOM), pp.747-755, 2015. ,
DOI : 10.1109/INFOCOM.2015.7218444
Mining in a data-flow environment, Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '99, pp.114-124, 1999. ,
DOI : 10.1145/312129.312212
Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.12-26, 2000. ,
DOI : 10.1109/DISCEX.2000.821506
Use of machine learning in big data analytics for insider threat detection, MILCOM 2015, 2015 IEEE Military Communications Conference, pp.915-922, 2015. ,
DOI : 10.1109/MILCOM.2015.7357562
Feature Selection for Dimensionality Reduction, Subspace, Latent Structure and Feature Selection (SLSFS): Statistical and Optimization Perspectives Workshop., páginas, pp.84-102, 2006. ,
Um Sistema Acurado de DetecçDetecç?Detecção de Ameaças em Tempo Real por Processamento de Fluxos, Em SBRC, pp.572-585, 2016. ,
Bro: a system for detecting network intruders in real-time, Computer Networks, vol.31, issue.23-24, pp.23-242435, 1999. ,
DOI : 10.1016/S1389-1286(99)00112-7
Theoretical and Empirical Analysis of ReliefF and RReliefF, Machine Learning, pp.23-69, 2003. ,
Snort-Lightweight Intrusion Detection for Networks, Em Proceedings of the 13th USENIX conference on System administration, pp.229-238, 1999. ,
Kernel principal component analysis. Em Advances in kernel methods, pp.327-352, 1999. ,
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection, 2010 IEEE Symposium on Security and Privacy, pp.305-316, 2010. ,
DOI : 10.1109/SP.2010.25
The 8 requirements of real-time stream processing, ACM SIGMOD Record, vol.34, issue.4, pp.42-47, 2005. ,
DOI : 10.1145/1107499.1107504
A detailed analysis of the KDD CUP 99 data set, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009. ,
DOI : 10.1109/CISDA.2009.5356528
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. Em Recent Advances in Intrusion Detection, pp.107-126, 2007. ,
DOI : 10.1007/978-3-540-74320-0_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.4653
Dimensionality reduction: a comparative, Journal of Machine Learning Research, vol.10, pp.66-71, 2009. ,