http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-106973057-A

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_d6a6f422b091ba12ea61d4adbf1b0e8e
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1416
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F18-2411
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1466
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06K9-62
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L29-06
filingDate 2017-03-31-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_cf3eda5fe3c0a94ea60b191b534fbd9c
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_d6fc0bea49284f150a0159e6db8bf969
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_a069e6eff46b77fc1559ce044f8d2edb
publicationDate 2017-07-21-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber CN-106973057-A
titleOfInvention A classification method suitable for intrusion detection
abstract The invention discloses a classification method suitable for intrusion detection. According to the characteristics that the SVM classification algorithm is sensitive to unbalanced data sets and classifies in the kernel space, the minority class sample set in the training sample set is based on the kernel SMOTE oversampling, and at the same time adopt a mixed sampling method based on kernel-based fuzzy C-means clustering and undersampling for the majority class sample set to realize the balanced preprocessing of the unbalanced training data set, and then use Bagging on the newly obtained training sample set The ensemble learning method trains an ensemble classifier based on SVM. The model trained by this method can not only effectively improve the disadvantages of the traditional SVM intrusion detection model, such as unsatisfactory recognition of intrusion data and high misjudgment rate of normal data, but also the Bagging integration algorithm adopted is suitable for large-scale parallel computing.
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-115545111-B
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-108009249-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-110213222-B
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-110213222-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-115545111-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-110572382-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-111683048-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-108009249-B
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2019169704-A1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-109981624-B
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-110336789-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-110572382-B
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-109981624-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-109753742-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-108875365-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-113450779-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-108810910-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-110191085-B
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-115022038-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-110191085-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-111242188-B
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-111242188-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-111556016-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-108875365-B
priorityDate 2017-03-31-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID25572
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID415713197

Total number of triples: 42.