Supervised feature selection techniques in network intrusion detection: A critical review
Abstract Machine Learning (ML) techniques are becoming an invaluable support for network
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …
[BOOK][B] Applied integer programming: modeling and solution
DS Chen, RG Batson, Y Dang - 2011 - books.google.com
An accessible treatment of the modeling and solution of integer programming problems,
featuring modern applications and software In order to fully comprehend the algorithms …
featuring modern applications and software In order to fully comprehend the algorithms …
[BOOK][B] Handbook of approximation algorithms and metaheuristics
TF Gonzalez - 2007 - taylorfrancis.com
Delineating the tremendous growth in this area, the Handbook of Approximation Algorithms
and Metaheuristics covers fundamental, theoretical topics as well as advanced, practical …
and Metaheuristics covers fundamental, theoretical topics as well as advanced, practical …
Tabu search
Over the last 15 years, hundreds of papers presenting applications of tabu search, a
heuristic method originally proposed by (1986), to various combinatorial problems have …
heuristic method originally proposed by (1986), to various combinatorial problems have …
[BOOK][B] Introduction to computational optimization models for production planning in a supply chain
S Voß, DL Woodruff - 2006 - books.google.com
provide models that could be used by do-it-yourselfers and also can be used toprovideunderstandingofthebackgroundiss…
job of working with the (proprietary) algorithms of the software vendors. In this book we …
job of working with the (proprietary) algorithms of the software vendors. In this book we …
Tabu search for attribute reduction in rough set theory
In this paper, we consider a memory-based heuristic of tabu search to solve the attribute
reduction problem in rough set theory. The proposed method, called tabu search attribute …
reduction problem in rough set theory. The proposed method, called tabu search attribute …
A survey on evolutionary algorithms dynamics and its complexity–Mutual relations, past, present and future
I Zelinka - Swarm and Evolutionary Computation, 2015 - Elsevier
Swarm and evolutionary based algorithms represent a class of search methods that can be
used for solving optimization problems. They mimic natural principles of evolution and …
used for solving optimization problems. They mimic natural principles of evolution and …
Hybrid immune-genetic algorithm method for benefit maximisation of distribution network operators and distributed generation owners in a deregulated environment
In deregulated power systems, distribution network operators (DNO) are responsible for
maintaining the proper operation and efficiency of distribution networks. This is achieved …
maintaining the proper operation and efficiency of distribution networks. This is achieved …
Rough set and scatter search metaheuristic based feature selection for credit scoring
J Wang, AR Hedar, S Wang, J Ma - Expert Systems with Applications, 2012 - Elsevier
As the credit industry has been growing rapidly, credit scoring models have been widely
used by the financial industry during this time to improve cash flow and credit collections …
used by the financial industry during this time to improve cash flow and credit collections …
The case for strategic oscillation
We study a “hard” optimization problem for metaheuristic search, where a natural
neighborhood (that consists of moves for flip** the values of zero-one variables) confronts …
neighborhood (that consists of moves for flip** the values of zero-one variables) confronts …