Application of Unbalanced Data Approach to Network Intrusion Detection

Zhao Yueai, Chen Junjie. Application of Unbalanced Data Approach to Network Intrusion Detection. In First International Workshop on Database Technology and Applications, DBTA 2009, Wuhan, Hubei, China, April 25-26, 2009, Proceedings. pages 140-143, IEEE Computer Society, 2009. [doi]

@inproceedings{YueaiJ09,
  title = {Application of Unbalanced Data Approach to Network Intrusion Detection},
  author = {Zhao Yueai and Chen Junjie},
  year = {2009},
  doi = {10.1109/DBTA.2009.116},
  url = {http://doi.ieeecomputersociety.org/10.1109/DBTA.2009.116},
  tags = {data-flow, systematic-approach},
  researchr = {https://researchr.org/publication/YueaiJ09},
  cites = {0},
  citedby = {0},
  pages = {140-143},
  booktitle = {First International Workshop on Database Technology and Applications, DBTA 2009, Wuhan, Hubei, China, April 25-26, 2009, Proceedings},
  publisher = {IEEE Computer Society},
  isbn = {978-0-7695-3604-0},
}