You are in the accessibility menu

Please use this identifier to cite or link to this item: http://acervodigital.unesp.br/handle/11449/135267
Full metadata record
DC FieldValueLanguage
dc.contributor.authorCosta, Kelton Augusto Pontara da-
dc.contributor.authorPereira, Clayton Reginaldo-
dc.contributor.authorPereira, Luís Augusto Martins-
dc.contributor.authorNakamura, Rodrigo Yuji Mizobe-
dc.contributor.authorPapa, João Paulo-
dc.date.accessioned2016-03-02T13:00:26Z-
dc.date.accessioned2016-10-25T21:32:16Z-
dc.date.available2016-03-02T13:00:26Z-
dc.date.available2016-10-25T21:32:16Z-
dc.date.issued2013-
dc.identifierhttp://www.mirlabs.net/jias/secured/Volume8-Issue2/vol8-issue2.html-
dc.identifier.citationJournal of Information Assurance and Security, v. 8, n. 2, p. 76-85, 2013.-
dc.identifier.issn1554-1010-
dc.identifier.urihttp://hdl.handle.net/11449/135267-
dc.identifier.urihttp://acervodigital.unesp.br/handle/11449/135267-
dc.description.abstractIn this paper we deal with the problem of boosting the Optimum-Path Forest (OPF) clustering approach using evolutionary-based optimization techniques. As the OPF classifier performs an exhaustive search to find out the size of sample's neighborhood that allows it to reach the minimum graph cut as a quality measure, we compared several optimization techniques that can obtain close graph cut values to the ones obtained by brute force. Experiments in two public datasets in the context of unsupervised network intrusion detection have showed the evolutionary optimization techniques can find suitable values for the neighborhood faster than the exhaustive search. Additionally, we have showed that it is not necessary to employ many agents for such task, since the neighborhood size is defined by discrete values, with constrain the set of possible solution to a few ones.en
dc.format.extent76-85-
dc.language.isoeng-
dc.sourceCurrículo Lattes-
dc.titleA comparison about evolutionary algorithms for optimum-path forest clustering optimizationen
dc.typeoutro-
dc.contributor.institutionUniversidade Estadual Paulista (UNESP)-
dc.description.affiliationUniversidade Estadual Paulista Júlio de Mesquita Filho, Departamento de Computação, Faculdade de Ciências de Bauru, Bauru, Av. Eng. Luiz Edmundo Carrijo Coube, 14-01, Jardim Paraíso, CEP 17033360, SP, Brasil-
dc.description.affiliationUnespUniversidade Estadual Paulista Júlio de Mesquita Filho, Departamento de Computação, Faculdade de Ciências de Bauru, Bauru, Av. Eng. Luiz Edmundo Carrijo Coube, 14-01, Jardim Paraíso, CEP 17033360, SP, Brasil-
dc.rights.accessRightsAcesso restrito-
dc.relation.ispartofJournal of Information Assurance and Security-
dc.identifier.lattes9039182932747194-
dc.identifier.lattes3369681396058151-
dc.identifier.lattes9083697774870852-
dc.identifier.lattes5228991166855582-
dc.identifier.lattes8448107303335081-
Appears in Collections:Artigos, TCCs, Teses e Dissertações da Unesp

There are no files associated with this item.
 

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.