[1] V. Paxson and R. Sommer, “Outside the Closed World: On using Machine Learning for Network Intrusion Detection,” in Proceedings of the 2010 IEEE Symposium on Security and Privacy, pp. 305-316, 2010 [2] B. Sun, Y. Zhang, and Z. Shang, “The Status and Trend of Intrusion Detection System Research,” in Proceedings of the 2012 Second International Conference on Electric Information and Control Engineering, Vol. 1, pp. 1559-1561, 2012 [3] M. Dash and H. Liu, “Feature Selection for Classification,” Intelligent Data Analysis, Vol. 1, No. 3, pp. 131-156, 1997 [4] S. W. Lin, K. C. Ying, C. Y. Lee,Z. J. Lee, “An Intelligent Algorithm with Feature Selection and Decision Rules Applied to Anomaly Intrusion Detection,” Applied Soft Computing, Vol. 12, No. 10, pp. 3285-3290, 2012 [5] H. H. Gao, X. Y. Wang,H. H. Yang, “Ant Colony Optimization based Network Intrusion Feature Selection and Detection,” inProceedings of International Conference on Machine Learning & Cybernetics, 2005 [6] H. Q.Huang and H. Sun, “Intrusion Detection of Particle Swarm Selection Feature and Information Gain Determination Feature Weight,” Computer Applications, Vol. 34, No. 6, pp. 1686-1688, 2014 [7] L. D. S.Coelho, S. Deb, and X. Z. Gao, “A New Metaheuristic Optimisation Algorithm Motivated by Elephant Herding Behaviour,” International Journal of Bio-Inspired Computation, Vol. 8, No. 6, pp. 394-409, 2017 [8] A. Alihodzic, E. Tuba,M. Tuba, “Multilevel Image Thresholding using Elephant Herding Optimization Algorithm,” inProceedings of International Conference on Engineering of Modern Electric Systems, pp. 240-243, 2017 [9] E. Tuba and Z. Stanimirovic, “Elephant Herding Optimization Algorithm for Support Vector Machine Parameters Tuning,” inProceedings of International Conference on Electronics, Computers and Artificial Intelligence, pp. 1-4, 2017 [10] R. K.Mallick and N. Nahak, “Hybrid Differential Evolution Particle Swarm Optimization (DE-PSO) Algorithm for Optimization of Unified Power Flow Controller Parameters,” inProceedings of IEEE Uttar Pradesh Section International Conference on Electrical, 2017 [11] W. Zhu and Q. Zhang, “Application of Machine Learning in Network Intrusion Detection,” Data Acquisition and Processing, Vol. 32, No. 3, pp. 479-488, 2017 [12] M. X.Hua and F. J. Zhang, “Intrusion Detection System Framework in Big Data Environment,” Communications Technology, Vol. 48, No. 11, pp. 1300-1304, 2015 [13] W. Wang and J. Zhang, “Research and Implementation of Network Intrusion Detection Algorithm based on Cloud Computing Platform,” Modern Electronic Technology, Vol. 39, No. 19, pp. 76-79, 2016 [14] H. Li and Q. Wu, “A Distributed Intrusion Detection Model based on Cloud Theory,” inProceedings of International Conference on Cloud Computing and Intelligent Systems, pp. 435-439, 2012 [15] T. L. Huang, X. Y. Liu,X. Wang, “Research on the Intrusion Detection Mechanism based on Cloud Computing,” inProceedings of International Conference on Intelligent Computing & Integrated Systems, pp. 125-128, 2010 [16] C. Barba-González, J. Garcia-Nieto, A. J. Nebro,J. F.Aldana-Montes, “Multi-Objective Big Data Optimization with Metal and Spark,” inProceedings of International Conference on Evolutionary Multi-Criterion Optimization, pp. 16-30, 2017 [17] Z. M. Fang, Z. Y. Ruan,P. P. Zhou, “Doppio: I/O-Aware Performance Analysis, Modeling and Optimization for In-Memory Computing Framework,” inProceedings of IEEE International Symposium on Performance Analysis of Systems & Software, Vol. 1, pp. 22-32, 2018 [18] G. G. Wang, L. D. S.Coelho, and S. Deb, “Elephant Herding Optimization,” inProceedings of International Symposium on Computational and Business Intelligence, pp. 1-5, 2016 [19] V. Das, S. N. Omkar, J. Senthilnath,V. Mani, “Clustering using Levy Flight Cuckoo Search,”Advances in Intelligent Systems and Computing, Vol. 202, pp. 65-75, 2013 [20] R. Eberhart and J. Kennedy, “Particle Swarm Optimization,” inProceedings of Icnn'95-International Conference on Neural Networks, Vol. 4, pp. 1942-1948, 2002 [21] J. Q. Wang, L. X. Zhang, Y. N. Zhao, et al., “Feature Selection in Machine Learning,” Computer Science, Vol. 31, No. 11, pp. 180-184, 2004 [22] Y. Chen, Y. Li, H. W. Shen, X. Q. Chang, “An Efficient Feature Selection Algorithm for Lightweight Intrusion Detection Systems,” Chinese Journal of Computers, Vol. 30, No. 8, pp. 1398-1408, 2007 [23] M. Chowdhury, M. J. Franklin, M. Zaharia, S. Shenker,I. Stoica, “Spark: Cluster Computing with Working Sets,” inProceedings of Usenix Conference on Hot Topics in Cloud Computing, pp. 10, 2010 [24] S. Q.Ruan and X. D. Wu, “Comparison of MapReduce and Spark for Big Data Analysis,”Journal of Software, No. 6, 2018 [25] J. Rini and K. K. Sherly, “Parallel Frequent Itemset Mining with Spark RDD Framework for Disease Prediction,” inProceedings of International Conference on Circuit, 2016 [26] J. S.Wu and W. P. Zhang, “Data Analysis and Study on KDDCUP99 Dataset,” Computer Applications and Software, Vol. 31, No. 11, pp. 321-325, 2014 |