2018 • In Kaiafas, Georgios; Varisteas, Georgios; Lagraa, Sofianeet al. (Eds.) IEEE/IFIP Network Operations and Management Symposium, 23-27 April 2018, Taipei, Taiwan Cognitive Management in a Cyber World
G. Canbek, S. Sagiroglu, T. T. Temizel, and N. Baykal. A comprehensive visualized roadmap to gain new insights. In Computer Science and Engineering (UBMK), 2017 International Conference on, pages 821-826. IEEE, 2017.
M. Dowle and A. Srinivasan. data.table: Extension of 'data.frame', 2017. R package version 1.10.5.
A. FernáNdez, V. LóPez, M. Galar, M. J. Del Jesus, and F. Herrera. Analysing the classification of imbalanced data-sets with multiple classes: Binarization techniques and ad-hoc approaches. Knowledgebased systems, 42:97-110, 2013.
M. Gao, X. Hong, S. Chen, and C. J. Harris. A combined smote and pso based rbf classifier for two-class imbalanced problems. Neurocomputing, 74(17):3456-3466, 2011.
N. Heard and P. Rubin-Delanchy. Network-wide anomaly detection via the dirichlet process. In 2016 IEEE Conference on Intelligence and Security Informatics (ISI), pages 220-224, 2016.
A. D. Kent. Comprehensive, Multi-Source Cyber-Security Events. Los Alamos National Laboratory, 2015.
A. D. Kent. Cybersecurity data sources for dynamic network research. In Dynamic Networks in Cybersecurity. Imperial College Press, 2015.
A. D. Kent, L. M. Liebrock, and J. C. Neil. Authentication graphs: Analyzing user behavior within an enterprise network. Computers &Security, pages 150-166, 2015.
L. I. Kuncheva. Combining pattern classifiers: methods and algorithms. John Wiley &Sons, 2004.
W.-J. Lin and J. J. Chen. Class-imbalanced classifiers for highdimensional data. Briefings in bioinformatics, 14(1):13-26, 2012.
A. More. Survey of resampling techniques for improving classification performance in unbalanced datasets. arXiv preprint arXiv:1608.06048, 2016.
C. Orrite, M. Rodríguez, F. Martínez, and M. Fairhurst. Classifier ensemble generation for the majority vote rule. In Iberoamerican Congress on Pattern Recognition, pages 340-347. Springer, 2008.
Y. Tang, Y.-Q. Zhang, N. V. Chawla, and S. Krasser. Svms modeling for highly imbalanced classification. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 39(1):281-288, 2009.
M. Turcotte, J. Moore, N. Heard, and A. McPhall. Poisson factorization for peer-based anomaly detection. In 2016 IEEE Conference on Intelligence and Security Informatics (ISI), pages 208-210, 2016.
Verizon. 2016 Data Breach Investigations Report. Verizon Business Journal, (1):1-65, 2016.
C. K. Williams, A. Engelhardt, T. Cooper, Z. Mayer, A. Ziem, L. Scrucca, Y. Tang, C. Candan, T. Hunt, and M. M. Kuhn. Package caret. 2017.