From ed9406b95d8120c27fd79c2b5e818730bf4ea420 Mon Sep 17 00:00:00 2001 From: unintendedbear Date: Mon, 4 Sep 2017 18:43:30 +0200 Subject: [PATCH] Addressing review comments for chapter 3, sections 3.2 and 3.3. References #5 --- Chapters/02-byodSotA.tex | 18 +- FrontBackmatter/Bibliography.tex | 2 +- GPrules.bib | 408 +++++++++++++++++++++++++++++++ 3 files changed, 418 insertions(+), 10 deletions(-) create mode 100644 GPrules.bib diff --git a/Chapters/02-byodSotA.tex b/Chapters/02-byodSotA.tex index be79c51..8fad6ef 100644 --- a/Chapters/02-byodSotA.tex +++ b/Chapters/02-byodSotA.tex @@ -46,12 +46,12 @@ \section{Preliminary concepts and background about enterprise security} \section{Adoption of BYOD} \label{sec:byodadoption} -Once the main concepts about why the companies need additional security, we now need to understand the size of the problem, in terms of the diffusion of the BYOD philosophy. We need to establish, in terms of number of employees that use their personal devices at work and in which other places this philosophy is being adopted, how urgent is to provide solutions. After that, in the following chapter, we will review what solutions there exist and the possibilities they offer. +Once the main concepts about why the companies need additional security have been discussed, we now need to understand the size of the problem, in terms of the diffusion of the BYOD philosophy. We need to establish, in terms of number of employees that use their personal devices at work and in which other places this philosophy is being adopted, how urgent is to provide solutions. This could help us to set the basis of the scenario we are going to deal with when building our methodology as a solution. After that, in the following chapter, we will review what solutions there exist and the possibilities they offer. \subsection{BYOD in the enterprise} \label{subsec:byodcompany} -The company Cisco made in 2012 a report that they have called ``Connected World Technology Report'' \cite{cisco2012}. In this report they interviewed 1800 people from 18 different countries and ages 18 to 30 about their personal and work life around their devices. The key results of this study are summarised as follows: +The company Cisco made in 2012 a report called ``Connected World Technology Report'' \cite{cisco2012}. In this report they interviewed 1800 people from 18 different countries and ages from 18 to 30 about their personal and work life around their devices. The key results of this study are summarised as follows: \begin{itemize} \item The 90\% of people said that they normally look at their smartphones as part of their waking up daily routine. This means that they like to be informed about any important matters before going to work and it is seen as positive by the IT professionals. @@ -64,16 +64,16 @@ \subsection{BYOD in the enterprise} \item Finally, a 66\% of the people who responded in the survey agree with the statement ``employers should not track employees' online activities -- it's none of their business''. \end{itemize} -Thomson \cite{thomson2012byod} also talks about this report in his article, adding some detailed graphs in order to extract more conclusions. In his article, the author talks, on the one hand, about the users -- employees who demand BYOD -- and , on the other hand, about how the companies can adapt to them. Therefore, Thompson remarks that BYOD is important because only 39\% of the people suryeved by Cisco see themselves as responsible for securing their work devices and data. The rest think it is a matter for the IT department, the service provider, or both. With regard to the policies, a 12\% agreed with the IT policies being unfair or not being useful, and mostly half of the people surveyed asked for the company to understand their needs and to make flexible security policies. As suggestions, the author stands for intrusion prevention systems, reputation filtering, and user training in security. +Thomson \cite{thomson2012byod} also talks about this report, adding some detailed graphs in order to extract more conclusions. In his article, the author talks, on the one hand, about the users -- employees who demand BYOD -- and, on the other hand, about how the companies can adapt to them. Therefore, Thompson remarks that BYOD is important because only 39\% of the people suryeved by Cisco see themselves as responsible for securing their work devices and data. The rest think it is a matter for the IT department, the service provider, or both. With regard to the policies, a 12\% agreed with the IT policies being unfair or not being useful, and mostly half of the people surveyed asked for the company to understand their needs and to make flexible security policies. As suggestions, the author stands for intrusion prevention systems, reputation filtering, and user training in security. The latest found report from Cisco is from 2014 \cite{cisco2014}. In this one they also interviewed people from 31 to 40 years old, in order to establish the differences between these two generations. However, the numbers are closely the same as in the report from 2012 \cite{cisco2012}. On the other hand, a series of interviews and surveys were carried out during the MUSES project. They are detailed in \cite{musesD41, musesD42}. -The first document is devoted to identify what is called a ``Persona'', i.e. a user archetypes \cite{adlin2010essential}. To this end, both employees and CSOs were interviewed or presented a questionnaire about the devices they used and the security policies of their companies. Thus, the main conclusions from the study are these: +The first document is devoted to identify what is called a ``Persona'', i.e. a user archetypes \cite{adlin2010essential}. To this end, both employees and CSOs were interviewed or presented a questionnaire about the devices they used and the security policies of their companies. Thus, the main conclusions from the study are summarised in what follows: \begin{itemize} - \item From the employees side, the study includes focus groups and an online questionnaire. In total, there were 21 people in the focus groups and 448 people responded to the online questionnaires. All reported to be experienced with technology and are from different countries. + \item From the employees side, the study includes focus groups and an online questionnaire. In total, there were 21 people in the focus groups and 448 people responded to the online questionnaires, from different countries. All participants reported to be experienced with the use of technology. \begin{itemize} \item Half of the participants have company used devices, and when asked which ones, the most named were desktops, laptops, and smartphones in that order. \item It was observed that freelancers and self-employers were the ones who mostly tend to use their private devices for work purposes. Everyone agreed with their companies liking this practice because the employees are reachable beyond working time. @@ -96,20 +96,20 @@ \subsection{BYOD in the enterprise} \end{itemize} \end{itemize} -In this scenario we can see that the employees demand the adoption of BYOD by the companies, and usually do not care about security policies, as they think that only the IT department is responsible for security. We can also conclude that the companies tend to allow BYOD practices without properly securing the environment. For these reasons, there is room for the development of a tool that helps companies in adopting BYOD, protecting important and valuable company assets at the time it makes the employees aware of the security and data loss. +In this scenario we can see that the employees demand the adoption of BYOD by these companies, and usually do not care about security policies, as they think that only the IT department is responsible for security. We can also conclude that the surveyed companies tend to allow BYOD practices without properly securing the environment. For these reasons, there is room for the development of a tool that helps companies in adopting BYOD, protecting important and valuable company assets at the time it makes the employees aware of the security and data loss. \subsection{Other fields that have adopted BYOD} \label{subsec:byodother} -The advantages BYOD brings makes security policies gain traction in the education sector with an increasing number of schools around the world choosing to implement their own BYOD policies. In such environment, BYOD (also called Bring Your Own Technology) refers to a technology model that allows students to bring their own devices to school for learning in the classroom [\cite{sangani2013byod, song2014bring}]. The adoption of BYOD in schools is supported by the fact that technology plays a leading role in +The advantages BYOD brings make security policies gain traction in the education sector with an increasing number of schools around the world choosing to implement their own BYOD policies. In such environment, BYOD (also called Bring Your Own Technology or BYOT) refers to a technology model that allows students to bring their own devices to school for learning in the classroom \cite{sangani2013byod, song2014bring}. The adoption of BYOD in schools is supported by the fact that technology plays a leading role in pupils/students' everyday lives and should, therefore, be an integral part of their learning. However, for most schools it is financially unsustainable to provide every student with the most appropriate up-to-date device. BYOD is therefore considered an attractive, cost-effective alternative, provided that many students usually own devices that are superior and more up-to-date than those available in schools. BYOD at schools has several benefits as well such as personalising learning experiences, encouraging students' independent learning, and promoting anytime, anywhere learning opportunities. \section{Research lines in BYOD} -Since BYOD policies started to appear in companies' day-to-day policies a lot of research has been done about the advantages and disadvantages of this approach [\cite{singh2012byod}], as well as about how to properly implement it in order to respect privacy while trying to secure the resources [\cite{scarfo2012new, ali2015analysis, de2015corporate}]. These issues can be approached in different ways; Scarfo differentiates in [\cite{scarfo2012new}] two main ones: allowing the device to connect via desktop or application virtualisation, meaning enough control to avoid employee's devices monitorisation; or allowing the company to control devices via Mobile Device Management (MDM), which has to be legally agreed with the employee. +Since BYOD policies started to appear in companies' day-to-day policies a lot of research has been done about the advantages and disadvantages of this approach \cite{singh2012byod}, as well as about how to properly implement it in order to respect privacy while trying to secure the resources \cite{scarfo2012new, ali2015analysis, de2015corporate}. These issues can be approached in different ways; Scarfo differentiates in \cite{scarfo2012new} two main ones: allowing the device to connect via desktop or application virtualisation, meaning enough control to avoid employee's devices monitorisation; or allowing the company to control devices via Mobile Device Management (MDM), which has to be legally agreed with the employee. -Ali et al. expand from Scarfo's study in [\cite{ali2015analysis}] reviewing both BYOD access control and security models. The authors further distinguish between MDM and Kernel Modifications inside the security models, and conclude with the description of a proposed model which combines most of the reviewed solutions, i.e. MDM and Virtual Private Network (VPN) access together with an encrypted container for the accessed information depending on the level of restriction. However, from all the papers in [\cite{ali2015analysis}] claimed to enforce policies, only in [\cite{rhee2013high}] the authors actually describe how the policies are enforced by describing which data is monitored. In any case, none of the papers mention the application of GP to the enforcement of the security policies, but other techniques such as the implementation of +Ali et al. expand from Scarfo's study in \cite{ali2015analysis} reviewing both BYOD access control and security models. The authors further distinguish between MDM and Kernel Modifications inside the security models, and conclude with the description of a proposed model which combines most of the reviewed solutions, i.e. MDM and Virtual Private Network (VPN) access together with an encrypted container for the accessed information depending on the level of restriction. However, from all the papers in \cite{ali2015analysis} claimed to enforce policies, only in \cite{rhee2013high} the authors actually describe how the policies are enforced by describing which data is monitored. In any case, none of the papers mention the application of GP to the enforcement of the security policies, but other techniques such as the implementation of blacklists to avoid the installation of forbidden applications, or whitelists to allow only certain ones. These techniques can be useful with respect to the implementation of already defined security policies, but our method allows to discover new security policies, which in the case of black and white lists, can evolve them to include new and/or malicious applications. There is an emerging research area in the field of BYOD. This is because, it is becoming a growing trend \cite{Garba15organisational}. There exist several methodological works on this subject. Samaras \cite{Samaras13SaaS} proposes a methodology design of a security architecture taking into account their logical design, logical architecture, security mechanisms and physical architecture. First, the business processes are studied and legal and security requirements are analyzed. After applying several controls the architecture is validated using different criteria: Correctness, Completeness, Usability and Flexibility. Romer \cite{Romer14BestPractices} proposes a set of best practices for BYOD security: centralize control and monitoring, protect confidential devices, increase trust with private clouds, connect to important services (such as Dropbox), block risky services and choose proven solutions. h some works present studies on the impact of BYOD in privacy \cite{Miller12Privacy} or relationship between workers productivity and stress \cite{Haejung12Door}, the most of them are focused in describing new systems and concepts in this paradigm. Scarfo presents in \cite{Scarfo12survey} a survey about the coming up methods in BYOD security. This survey summarises the research in two different approaches: {\em hands-off} versus {\em hand-on} devices. The first one proposes the use of some kind of virtualization or wrapping of the applications, while the latter is based in a tight control and monitoring of the device by the company. diff --git a/FrontBackmatter/Bibliography.tex b/FrontBackmatter/Bibliography.tex index af45c46..b57f232 100644 --- a/FrontBackmatter/Bibliography.tex +++ b/FrontBackmatter/Bibliography.tex @@ -11,4 +11,4 @@ %\bibliographystyle{plainnat} \bibliographystyle{babplain-fl} \label{app:bibliography} -\bibliography{tesis,review_muses,data_mining_urls} \ No newline at end of file +\bibliography{tesis,review_muses,data_mining_urls,GPrules} \ No newline at end of file diff --git a/GPrules.bib b/GPrules.bib new file mode 100644 index 0000000..7b66b43 --- /dev/null +++ b/GPrules.bib @@ -0,0 +1,408 @@ +%-------------- +% Introduction +%-------------- + +@inproceedings{ballagas2004byod, + title={{BYOD}: Bring your own device}, + author={Ballagas, Rafael and Rohs, Michael and Sheridan, Jennifer G and Borchers, Jan}, + booktitle={Proceedings of the Workshop on Ubiquitous Display Environments, Ubicomp}, + year={2004} +} + +@article{singh2012byod, + title={{BYOD genie is out of the bottle: ``Devil or angel''}}, + author={Singh, Niharika}, + journal={Journal of Business Management \& Social Sciences Research}, + volume={1}, + number={3}, + pages={1--12}, + year={2012}, + publisher={Citeseer} +} + +@article{sangani2013byod, + title={BYOD to the classroom}, + author={Sangani, Kris}, + journal={Engineering \& Technology}, + volume={8}, + number={3}, + pages={42--45}, + year={2013}, + publisher={IET} +} + +@article{song2014bring, + title={{``Bring Your Own Device (BYOD)'' for seamless science inquiry in a primary school}}, + author={Song, Yanjie}, + journal={Computers \& Education}, + volume={74}, + pages={50--60}, + year={2014}, + publisher={Elsevier} +} + +@article{thomson2012byod, + title={{BYOD: enabling the chaos}}, + author={Thomson, Gordon}, + journal={Network Security}, + volume={2012}, + number={2}, + pages={5--8}, + year={2012}, + publisher={Elsevier} +} + +@article{morrow2012byod, + title={BYOD security challenges: control and protect your most sensitive data}, + author={Morrow, Bill}, + journal={Network Security}, + volume={2012}, + number={12}, + pages={5--8}, + year={2012}, + publisher={Elsevier} +} + +@book{back1996evolutionary, + title={Evolutionary algorithms in theory and practice: evolution strategies, evolutionary programming, genetic algorithms}, + author={Back, Thomas}, + year={1996}, + publisher={Oxford university press} +} + +@article{kishore2000application, + title={Application of genetic programming for multicategory pattern classification}, + author={Kishore, J Krishna and Patnaik, Lalit M. and Mani, V and Agrawal, VK}, + journal={IEEE transactions on evolutionary computation}, + volume={4}, + number={3}, + pages={242--258}, + year={2000}, + publisher={IEEE} +} + + +@ARTICLE{safavian1990survey, +author={S. R. Safavian and D. Landgrebe}, +journal={IEEE Transactions on Systems, Man, and Cybernetics}, +title={A survey of decision tree classifier methodology}, +year={1991}, +volume={21}, +number={3}, +pages={660--674}, +keywords={decision theory;neural nets;pattern recognition;search problems;trees (mathematics);decision tree classifier;feature selection;neutral networks;node;pattern recognition;search strategies;tree structure;Classification tree analysis;Decision trees;Integrated circuit testing;Performance analysis;System testing;Training data}, +doi={10.1109/21.97458}, +ISSN={0018-9472}, +month={May} +} + +@book{Kaeo:2003:DNS:1201807, + author = {Kaeo, Merike}, + title = {Designing Network Security, Second Edition}, + year = {2003}, + isbn = {1587051176}, + publisher = {Cisco Press}, +} + +@book{freitas2002data, + title={Data mining and knowledge discovery with evolutionary algorithms}, + author={Freitas, Alex A}, + year={2002}, + publisher={Springer Science \& Business Media} +} + +@book{witten2005data, + title={Data Mining: Practical machine learning tools and techniques}, + author={Witten, Ian H and Frank, Eibe}, + year={2005}, + publisher={Morgan Kaufmann} +} + +@article{pietraszek2005data, + title={Data mining and machine learning - towards reducing false positives in intrusion detection}, + author={Pietraszek, Tadeusz and Tanner, Axel}, + journal={Information security technical report}, + volume={10}, + number={3}, + pages={169--183}, + year={2005}, + publisher={Elsevier} +} + +%-------------- +% Related Work +%-------------- + +@article{DeFalco2002257, +title = "Discovering interesting classification rules with genetic programming ", +journal = "Applied Soft Computing ", +volume = "1", +number = "4", +pages = "257--269", +year = "2002", +note = "", +issn = "1568-4946", +doi = "http://dx.doi.org/10.1016/S1568-4946(01)00024-2", +url = "http://www.sciencedirect.com/science/article/pii/S1568494601000242", +author = "I De Falco and A Della Cioppa and E Tarantino", +keywords = "Data mining", +keywords = "Classification", +keywords = "Genetic programming ", +abstract = "Data mining deals with the problem of discovering novel and interesting knowledge from large amount of data. This problem is often performed heuristically when the extraction of patterns is difficult using standard query mechanisms or classical statistical methods. In this paper a genetic programming framework, capable of performing an automatic discovery of classification rules easily comprehensible by humans, is presented. A comparison with the results achieved by other techniques on a classical benchmark set is carried out. Furthermore, some of the obtained rules are shown and the most discriminating variables are evidenced. " +} + +@article{Tsakonas2004195, +title = "Evolving rule-based systems in two medical domains using genetic programming ", +journal = "Artificial Intelligence in Medicine ", +volume = "32", +number = "3", +pages = "195--216", +year = "2004", +note = "Adaptive Systems and Hybrid Computational Intelligence in Medicine ", +issn = "0933-3657", +doi = "http://dx.doi.org/10.1016/j.artmed.2004.02.007", +url = "http://www.sciencedirect.com/science/article/pii/S0933365704001058", +author = "Athanasios Tsakonas and Georgios Dounias and Jan Jantzen and Hubertus Axer and Beth Bjerregaard and Diedrich Graf von Keyserlingk", +keywords = "Hybrid intelligence", +keywords = "Genetic programming", +keywords = "Grammar driven GP", +keywords = "Genetic-fuzzy systems", +keywords = "Inductive machine learning", +keywords = "Medical decision making", +keywords = "Aphasia", +keywords = "Pap-smear test ", +abstract = "SummaryObjective : To demonstrate and compare the application of different genetic programming (GP) based intelligent methodologies for the construction of rule-based systems in two medical domains: the diagnosis of aphasia's subtypes and the classification of pap-smear examinations. Material: Past data representing (a) successful diagnosis of aphasia's subtypes from collaborating medical experts through a free interview per patient, and (b) correctly classified smears (images of cells) by cyto-technologists, previously stained using the Papanicolaou method. Methods: Initially a hybrid approach is proposed, which combines standard genetic programming and heuristic hierarchical crisp rule-base construction. Then, genetic programming for the production of crisp rule based systems is attempted. Finally, another hybrid intelligent model is composed by a grammar driven genetic programming system for the generation of fuzzy rule-based systems. Results: Results denote the effectiveness of the proposed systems, while they are also compared for their efficiency, accuracy and comprehensibility, to those of an inductive machine learning approach as well as to those of a standard genetic programming symbolic expression approach. Conclusion: The proposed GP-based intelligent methodologies are able to produce accurate and comprehensible results for medical experts performing competitive to other intelligent approaches. The aim of the authors was the production of accurate but also sensible decision rules that could potentially help medical doctors to extract conclusions, even at the expense of a higher classification score achievement. " +} + +@article{bhowan2012developing, + title={Developing new fitness functions in genetic programming for classification with unbalanced data}, + author={Bhowan, Urvesh and Johnston, Mark and Zhang, Mengjie}, + journal={Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on}, + volume={42}, + number={2}, + pages={406--421}, + year={2012}, + publisher={IEEE} +} + +@ARTICLE{Miller201253, + author={Miller, K.W. and Voas, J. and Hurlburt, G.F.}, + title={{BYOD: Security and privacy considerations}}, + journal={IT Professional}, + year={2012}, + volume={14}, + number={5}, + pages={53--55}, + doi={10.1109/MITP.2012.93}, + art_number={6320585}, + note={cited By 66}, + url={https://www.scopus.com/inward/record.uri?eid=2-s2.0-84867375385&partnerID=40&md5=0832c8bf3c8000d4ad37843e96e862dc}, + document_type={Review}, + source={Scopus}, +} + +@inproceedings{scarfo2012new, + title={New security perspectives around BYOD}, + author={Scarfo, Antonio}, + booktitle={Broadband, Wireless Computing, Communication and Applications (BWCCA), 2012 Seventh International Conference on}, + pages={446--451}, + year={2012}, + organization={IEEE} +} + +@article{de2015corporate, + title={Corporate security solutions for BYOD: A novel user-centric and self-adaptive system}, + author={de las Cuevas, P and Mora, AM and Merelo, JJ and Castillo, PA and Garc{\'\i}a-S{\'a}nchez, P and Fern{\'a}ndez-Ares, A}, + journal={Computer Communications}, + volume={68}, + pages={83--95}, + year={2015}, + publisher={Elsevier} +} + +@inproceedings{ali2015analysis, + title={{Analysis of BYOD security frameworks}}, + author={Ali, Sara and Qureshi, Muhammad Nauman and Abbasi, Abdul Ghafoor}, + booktitle={2015 Conference on Information Assurance and Cyber Security (CIACS)}, + pages={56--61}, + year={2015}, + organization={IEEE} +} + +@inproceedings{rhee2013high, + title={High-Level Design for a Secure Mobile Device Management System}, + author={Rhee, Keunwoo and Eun, Sun-Ki and Joo, Mi-Ri and Jeong, Jihoon and Won, Dongho}, + booktitle={International Conference on Human Aspects of Information Security, Privacy, and Trust}, + pages={348--356}, + year={2013}, + organization={Springer} +} + +@article{rios2015mobile, + title={A mobile business information system for the control of local and remote workforce through reactive and behavior-based monitoring}, + author={R{\'\i}os-Aguilar, Sergio and Llor{\'e}ns-Montes, Francisco-Javier}, + journal={Expert Systems with Applications}, + volume={42}, + number={7}, + pages={3462--3469}, + year={2015}, + publisher={Elsevier} +} + +@article{espejo2010survey, + title={A survey on the application of genetic programming to classification}, + author={Espejo, Pedro G and Ventura, Sebasti{\'a}n and Herrera, Francisco}, + journal={IEEE Transactions on Systems, Man, and Cybernetics, Part C}, + volume={40}, + number={2}, + pages={121--144}, + year={2010} +} + +@article{miller2012byod, + title={BYOD: Security and Privacy Considerations.}, + author={Miller, Keith W and Voas, Jeffrey M and Hurlburt, George F}, + journal={It Professional}, + volume={14}, + number={5}, + pages={53--55}, + year={2012} +} + +@book{boillat2014handbook, + title={Handbook on European data protection law}, + author={Boillat, Philippe and Kjaerum, Morten}, + year={2014}, + publisher={Luxembourg: Publications Office of the European Union} +} + +@article{japkowicz2002class, + title={The class imbalance problem: A systematic study}, + author={Japkowicz, Nathalie and Stephen, Shaju}, + journal={Intelligent data analysis}, + volume={6}, + number={5}, + pages={429--449}, + year={2002}, + publisher={IOS Press} +} + +@incollection{chawla2005data, + title={Data mining for imbalanced datasets: An overview}, + author={Chawla, Nitesh V}, + booktitle={Data mining and knowledge discovery handbook}, + pages={853--867}, + year={2005}, + publisher={Springer} +} + +@article{sun2009classification, + title={Classification of imbalanced data: A review}, + author={Sun, Yanmin and Wong, Andrew KC and Kamel, Mohamed S}, + journal={International Journal of Pattern Recognition and Artificial Intelligence}, + volume={23}, + number={04}, + pages={687--719}, + year={2009}, + publisher={World Scientific} +} + +@book{han2011data, + title={Data mining: concepts and techniques}, + author={Han, Jiawei and Pei, Jian and Kamber, Micheline}, + year={2011}, + publisher={Elsevier} +} + +@misc{prechelt1994proben, + title={Proben 1-a set of benchmarks and benchmarking rules for neural network training algorithms}, + author={Prechelt, Lutz}, + year={1994} +} + +%--------------------- +% Problem Description +%--------------------- + +@inproceedings{lennon2012changing, + title={{Changing user attitudes to security in bring your own device (BYOD) \& the cloud}}, + author={Lennon, RG}, + booktitle={Tier 2 Federation Grid, Cloud \& High Performance Computing Science (RO-LCG), 2012 5th Romania}, + pages={49--52}, + year={2012}, + organization={IEEE} +} + + +@inproceedings{kohavi1995study, + title={A study of cross-validation and bootstrap for accuracy estimation and model selection}, + author={Kohavi, Ron and others}, + booktitle = {Proceedings of the 14th International Joint Conference on Artificial Intelligence - Volume 2}, + series = {IJCAI'95}, + year = {1995}, + isbn = {1-55860-363-8}, + location = {Montreal, Quebec, Canada}, + pages = {1137--1143}, + numpages = {7}, + url = {http://dl.acm.org/citation.cfm?id=1643031.1643047}, + acmid = {1643047}, + publisher = {Morgan Kaufmann Publishers Inc.}, + address = {San Francisco, CA, USA}, +} + +%--------------------- +% Conclusions and Future Work +%--------------------- + + +@article{smote_02, + author = {Chawla, Nitesh V. and Bowyer, Kevin W. and Hall, Lawrence O. and Kegelmeyer, W. Philip}, + title = {SMOTE: Synthetic Minority Over-sampling Technique}, + journal = {J. Artif. Int. Res.}, + issue_date = {January 2002}, + volume = {16}, + number = {1}, + month = jun, + year = {2002}, + issn = {1076-9757}, + pages = {321--357}, + numpages = {37}, + url = {http://dl.acm.org/citation.cfm?id=1622407.1622416}, + acmid = {1622416}, + publisher = {AI Access Foundation}, + address = {USA}, +} + +%%%%%SOFTWARE + + + +@article{HallWEKA09, + title={The {WEKA} Data Mining Software: An Update}, + author={Mark Hall and Eibe Frank and Geoffrey Holmes and Bernhard Pfahringer and Peter Reutemann and Ian H. Witten}, + journal={SIGKDD Explorations}, + volume={11}, + number={1}, + year={2009}, + publisher={ACM} +} + +@article{DerracTests11, + author = {Joaqu{\'{\i}}n Derrac and + Salvador Garc{\'{\i}}a and + Daniel Molina and + Francisco Herrera}, + title = {A practical tutorial on the use of nonparametric statistical tests + as a methodology for comparing evolutionary and swarm intelligence + algorithms}, + journal = {Swarm and Evolutionary Computation}, + volume = {1}, + number = {1}, + pages = {3--18}, + year = {2011}, + url = {http://dx.doi.org/10.1016/j.swevo.2011.02.002}, + doi = {10.1016/j.swevo.2011.02.002}, + timestamp = {Tue, 24 Jan 2012 15:02:54 +0100}, + biburl = {http://dblp.uni-trier.de/rec/bib/journals/swevo/DerracGMH11}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} \ No newline at end of file