Academic literature on the topic 'KDD Cup 1999'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'KDD Cup 1999.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "KDD Cup 1999"
Lee, Sukjoon, and Donghee Shim. "Analysis for the KDD Cup 1999 Data Using the Convolutional Neural Network." Journal of Next-generation Convergence Information Services Technology 10, no. 2 (April 30, 2021): 123–32. http://dx.doi.org/10.29056/jncist.2021.04.02.
Full textSerinelli, Benedetto Marco, Anastasija Collen, and Niels Alexander Nijdam. "Training Guidance with KDD Cup 1999 and NSL-KDD Data Sets of ANIDINR: Anomaly-Based Network Intrusion Detection System." Procedia Computer Science 175 (2020): 560–65. http://dx.doi.org/10.1016/j.procs.2020.07.080.
Full textXia, Yong Xiang, Zhi Cai Shi, Yu Zhang, and Jian Dai. "A SVM Intrusion Detection Method Based on GPU." Applied Mechanics and Materials 610 (August 2014): 606–10. http://dx.doi.org/10.4028/www.scientific.net/amm.610.606.
Full textSeo, Jae-Hyun, and Yong-Hyuk Kim. "Machine-Learning Approach to Optimize SMOTE Ratio in Class Imbalance Dataset for Intrusion Detection." Computational Intelligence and Neuroscience 2018 (November 1, 2018): 1–11. http://dx.doi.org/10.1155/2018/9704672.
Full textSharma, Srishti, Yogita Gigras, Rita Chhikara, and Anuradha Dhull. "Analysis of NSL KDD Dataset Using Classification Algorithms for Intrusion Detection System." Recent Patents on Engineering 13, no. 2 (May 27, 2019): 142–47. http://dx.doi.org/10.2174/1872212112666180402122150.
Full textCheng, Guo Zhen, Dong Nian Cheng, and He Lei. "A Novel Network Traffic Anomaly Detection Based on Multi-Scale Fusion." Applied Mechanics and Materials 48-49 (February 2011): 102–5. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.102.
Full textKim, Jiyeon, Jiwon Kim, Hyunjung Kim, Minsun Shim, and Eunjung Choi. "CNN-Based Network Intrusion Detection against Denial-of-Service Attacks." Electronics 9, no. 6 (June 1, 2020): 916. http://dx.doi.org/10.3390/electronics9060916.
Full textKrishnan Sadhasivan, Dhanalakshmi, and Kannapiran Balasubramanian. "A Fusion of Multiagent Functionalities for Effective Intrusion Detection System." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6216078.
Full textObimbo, Charlie, and Matthew Jones. "Applying Variable Coe_cient functions to Self-Organizing Feature Maps for Network Intrusion Detection on the 1999 KDD Cup Dataset." Procedia Computer Science 8 (2012): 333–37. http://dx.doi.org/10.1016/j.procs.2012.01.069.
Full textAlbahar, Marwan Ali. "Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environments." Security and Communication Networks 2019 (November 18, 2019): 1–9. http://dx.doi.org/10.1155/2019/8939041.
Full textDissertations / Theses on the topic "KDD Cup 1999"
Вашеняк, Артем Миколайович. "Методи виявлення прихованих атак на інформаційні системи із застосуванням нечіткої логіки." Магістерська робота, Хмельницький національний університет, 2021. http://elar.khnu.km.ua/jspui/handle/123456789/11104.
Full textBooks on the topic "KDD Cup 1999"
Červinka, Stanislav. Kdo zabil Arconu? Praha: Tempo, 1991.
Find full textFind and Fit Baby Animals: (Quarto 1999). Burnaby, Canada: Ben's Books, 1999.
Find full textBook chapters on the topic "KDD Cup 1999"
Wang, Yun, and Lee Seidman. "Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior." In Information Security and Ethics, 2407–21. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch159.
Full textZhang, Ji. "A Subspace-Based Analysis Method for Anomaly Detection in Large and High-Dimensional Network Connection Data Streams." In Data Mining, 530–49. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2455-9.ch026.
Full textZhang, Ji. "A Dynamic Subspace Anomaly Detection Method Using Generic Algorithm for Streaming Network Data." In Handbook of Research on Emerging Developments in Data Privacy, 403–25. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-7381-6.ch018.
Full textConference papers on the topic "KDD Cup 1999"
Shah, Bhavin, and Bhushan H. Trivedi. "Reducing Features of KDD CUP 1999 Dataset for Anomaly Detection Using Back Propagation Neural Network." In 2015 Fifth International Conference on Advanced Computing & Communication Technologies (ACCT). IEEE, 2015. http://dx.doi.org/10.1109/acct.2015.131.
Full textWilson, Ryan, and Charlie Obimbo. "Self-organizing feature maps for User-to-Root and Remote-to-Local network intrusion detection on the KDD Cup 1999 dataset." In 2011 World Congress on Internet Security (WorldCIS-2011). IEEE, 2011. http://dx.doi.org/10.1109/worldcis17046.2011.5749879.
Full textFank, Elias Augusto, Geomar A. Schreiner, and Denio Duarte. "Estudo comparativo de plataformas de Deep Learning: Apache Singa, Graphlab e H2O." In Escola Regional de Banco de Dados. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/erbd.2021.17234.
Full textReports on the topic "KDD Cup 1999"
Epel, Bernard L., Roger N. Beachy, A. Katz, G. Kotlinzky, M. Erlanger, A. Yahalom, M. Erlanger, and J. Szecsi. Isolation and Characterization of Plasmodesmata Components by Association with Tobacco Mosaic Virus Movement Proteins Fused with the Green Fluorescent Protein from Aequorea victoria. United States Department of Agriculture, September 1999. http://dx.doi.org/10.32747/1999.7573996.bard.
Full text