Journal articles on the topic 'KDD Cup 1999'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'KDD Cup 1999.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lee, Sukjoon, and Donghee Shim. "Analysis for the KDD Cup 1999 Data Using the Convolutional Neural Network." Journal of Next-generation Convergence Information Services Technology 10, no. 2 (2021): 123–32. http://dx.doi.org/10.29056/jncist.2021.04.02.
Full textEniodunmo, Oluwapelumi, and Raid Al-Aqtash. "A Predictive Model to Predict a Cyberattack Using Self Normalizing Neural Networks." International Journal of Statistics and Probability 12, no. 6 (2023): 60. http://dx.doi.org/10.5539/ijsp.v12n6p60.
Full textXia, Yong Xiang, Zhi Cai Shi, Yu Zhang, and Jian Dai. "A SVM Intrusion Detection Method Based on GPU." Applied Mechanics and Materials 610 (August 2014): 606–10. http://dx.doi.org/10.4028/www.scientific.net/amm.610.606.
Full textSeo, Jae-Hyun, and Yong-Hyuk Kim. "Machine-Learning Approach to Optimize SMOTE Ratio in Class Imbalance Dataset for Intrusion Detection." Computational Intelligence and Neuroscience 2018 (November 1, 2018): 1–11. http://dx.doi.org/10.1155/2018/9704672.
Full textMathan, Pinaki Shashishekhar. "Intrusion Detection Using Machine Learning Classification and Regression." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42130.
Full textSerinelli, Benedetto Marco, Anastasija Collen, and Niels Alexander Nijdam. "Training Guidance with KDD Cup 1999 and NSL-KDD Data Sets of ANIDINR: Anomaly-Based Network Intrusion Detection System." Procedia Computer Science 175 (2020): 560–65. http://dx.doi.org/10.1016/j.procs.2020.07.080.
Full textSharma, Srishti, Yogita Gigras, Rita Chhikara, and Anuradha Dhull. "Analysis of NSL KDD Dataset Using Classification Algorithms for Intrusion Detection System." Recent Patents on Engineering 13, no. 2 (2019): 142–47. http://dx.doi.org/10.2174/1872212112666180402122150.
Full textCheng, Guo Zhen, Dong Nian Cheng, and He Lei. "A Novel Network Traffic Anomaly Detection Based on Multi-Scale Fusion." Applied Mechanics and Materials 48-49 (February 2011): 102–5. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.102.
Full textMohammed, Mohammed, and Khattab M. Ali Alheeti. "AI-Driven Features for Intrusion Detection and Prevention Using Random Forest." Journal of Cybersecurity and Information Management 16, no. 1 (2025): 01–14. https://doi.org/10.54216/jcim.160101.
Full textKim, Jiyeon, Jiwon Kim, Hyunjung Kim, Minsun Shim, and Eunjung Choi. "CNN-Based Network Intrusion Detection against Denial-of-Service Attacks." Electronics 9, no. 6 (2020): 916. http://dx.doi.org/10.3390/electronics9060916.
Full textKrishnan Sadhasivan, Dhanalakshmi, and Kannapiran Balasubramanian. "A Fusion of Multiagent Functionalities for Effective Intrusion Detection System." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6216078.
Full textReeja Susan Reji, Anjitha Raj, Riya Raju, Manya, and Sunandha Rajagopal. "Comparative Study of Deep Learning Models for Network Intrusion Detection." international journal of engineering technology and management sciences 7, no. 4 (2023): 313–22. http://dx.doi.org/10.46647/ijetms.2023.v07i04.043.
Full textPinal J. Patel. "IDS Framework based on ML for Cloud Computing." Journal of Information Systems Engineering and Management 10, no. 18s (2025): 278–83. https://doi.org/10.52783/jisem.v10i18s.2913.
Full textLaftah Al-Yaseen, Wathiq, Zulaiha Ali Othman, and Mohd Zakree Ahmad Nazri. "Hybrid ModifiedK-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems." Scientific World Journal 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/294761.
Full textAlbahar, Marwan Ali. "Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environments." Security and Communication Networks 2019 (November 18, 2019): 1–9. http://dx.doi.org/10.1155/2019/8939041.
Full textT. Archana, A. Narmada reddy, A. Datta Sai Kumar reddy, B. Surya Kaushik, and Ms. G Mary Swarna Latha. "Intrusion Detection System Using ANN." International Research Journal on Advanced Engineering Hub (IRJAEH) 2, no. 12 (2024): 2840–46. https://doi.org/10.47392/irjaeh.2024.0393.
Full textI., A. Hodashinsky, and A. Mech M. "CONSTRUCTING A FUZZY NETWORK INTRUSION CLASSIFIER BASED ON DIFFERENTIAL EVOLUTION AND HARMONIC SEARCH." International Journal of Computer Networks & Communications (IJCNC) 10, no. 2 (2018): 85–91. https://doi.org/10.5281/zenodo.1227885.
Full textObimbo, Charlie, and Matthew Jones. "Applying Variable Coe_cient functions to Self-Organizing Feature Maps for Network Intrusion Detection on the 1999 KDD Cup Dataset." Procedia Computer Science 8 (2012): 333–37. http://dx.doi.org/10.1016/j.procs.2012.01.069.
Full textHu, Ying, Li Min Sun, Sheng Chen Yu, Jiang Lan Huang, Xiao Ju Wang, and Hui Guo. "Coal Mine Disaster Warning Internet of Things Intrusion Detection System Based on Back Propagation Neural Network Improved by Genetic Algorithms." Applied Mechanics and Materials 441 (December 2013): 343–46. http://dx.doi.org/10.4028/www.scientific.net/amm.441.343.
Full textMuhammad, Arif Wirawan, and Faza Alameka. "Integrasi Normalized Relative Network Entropy Dan Neural Network Backpropagation (BP) Untuk Deteksi Dan Peramalan Serangan DDOS." Jurnal Rekayasa Teknologi Informasi (JURTI) 1, no. 1 (2017): 1. http://dx.doi.org/10.30872/jurti.v1i1.630.
Full textFegade, Saurabh, Amey Bhadkamka, Kamlesh Karekar, Jaikishan Jeshnani, and Vinayak Kachare. "Network Intrusion Detection System Using C4.5 Algorithm." Journal of Communications Technology, Electronics and Computer Science 10 (March 1, 2017): 15. http://dx.doi.org/10.22385/jctecs.v10i0.139.
Full textGuo, Yanmin, Yu Wang, Faheem Khan, et al. "Traffic Management in IoT Backbone Networks Using GNN and MAB with SDN Orchestration." Sensors 23, no. 16 (2023): 7091. http://dx.doi.org/10.3390/s23167091.
Full textKoryshev, Nikolay, Ilya Hodashinsky, and Alexander Shelupanov. "Building a Fuzzy Classifier Based on Whale Optimization Algorithm to Detect Network Intrusions." Symmetry 13, no. 7 (2021): 1211. http://dx.doi.org/10.3390/sym13071211.
Full textRaman, M. R. Gauthama, K. Kannan, S. K. Pal, and V. S. Shankar Sriram. "Rough Set-hypergraph-based Feature Selection Approach for Intrusion Detection Systems." Defence Science Journal 66, no. 6 (2016): 612. http://dx.doi.org/10.14429/dsj.66.10802.
Full textPutra, Bayu Anugerah, Harun Mukhtar, Elsi Titasari Br Bangun, et al. "OPTIMISASI ALGORITMA K-MEANS DENGAN METODE REDUKSI DIMENSI UNTUK PENGELOMPOKAN BIG DATA DALAM ARSITEKTUR CLOUD COMPUTING." Journal of Software Engineering and Information Systems 5, no. 1 (2021): 1–8. https://doi.org/10.37859/seis.v5i1.7616.
Full textShrikant Telang. "Advanced Network Security: An Enhanced BI-LSTM Model for Intelligent Intrusion Detection." Journal of Information Systems Engineering and Management 10, no. 22s (2025): 73–90. https://doi.org/10.52783/jisem.v10i22s.3473.
Full textPaolini, Davide, Pierpaolo Dini, Ettore Soldaini, and Sergio Saponara. "One-Class Anomaly Detection for Industrial Applications: A Comparative Survey and Experimental Study." Computers 14, no. 7 (2025): 281. https://doi.org/10.3390/computers14070281.
Full textWilson, Ryan, and Charlie Obimbo. "Improvements on Self-Organizing Feature Maps for User-to-Root and Remote-to-Local Network Intrusion Detection on the 1999 KDD Cup Dataset." International Journal for Information Security Research 2, no. 2 (2012): 132–39. http://dx.doi.org/10.20533/ijisr.2042.4639.2012.0016.
Full textFang, Menghao, Yixiang Wang, Liangbin Yang, et al. "Reinventing Web Security: An Enhanced Cycle-Consistent Generative Adversarial Network Approach to Intrusion Detection." Electronics 13, no. 9 (2024): 1711. http://dx.doi.org/10.3390/electronics13091711.
Full textTomi, Yahya Christyawan, Afif Supianto Ahmad, and Firdaus Mahmudy Wayan. "Anomaly-based intrusion detector system using restricted growing self organizing map." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 3 (2019): 919–26. https://doi.org/10.11591/ijeecs.v13.i3.pp919-926.
Full textRen, Min, Peiyu Liu, Zhihao Wang, and Jing Yi. "A Self-Adaptive Fuzzyc-Means Algorithm for Determining the Optimal Number of Clusters." Computational Intelligence and Neuroscience 2016 (2016): 1–12. http://dx.doi.org/10.1155/2016/2647389.
Full textChristyawan, Tomi Yahya, Ahmad Afif Supianto, and Wayan Firdaus Mahmudy. "Anomaly-based intrusion detector system using restricted growing self organizing map." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 3 (2019): 919. http://dx.doi.org/10.11591/ijeecs.v13.i3.pp919-926.
Full textJain, Pratik, and Divyansh Kumrawat. "Comparing the Result of KDD Cup 1999 Data by using K-mean Algorithm and make Density based Cluster in Intrusion Detection System by Removing the Count Attribute." International Journal of Computer Applications 175, no. 16 (2020): 21–26. http://dx.doi.org/10.5120/ijca2020920661.
Full textAliyu. O, Omeiza, Bisallah Hashim. I, Okike Bnjamin, and Sanusi Muhammad. "An Improved Intrusion Detection in Wireless Sensor Networks Using Hybrid Multiclass Over-Sampling and Deep Neural Networks." International Journal of Advances in Scientific Research and Engineering 09, no. 12 (2023): 91–104. http://dx.doi.org/10.31695/ijasre.2023.9.12.8.
Full textA., M. Chandrashekhar, and Raghuveer K. "FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL NETWORKS AND SUPPORT VECTOR MACHINES." International Journal of Network Security & Its Applications (IJNSA) 5, no. 1 (2013): 71–90. https://doi.org/10.5281/zenodo.3873021.
Full textAlzuabidi, Israa Akram. "Building a Resilient Architecture with an Intelligent System Based on Support Vector Machines Algorithm for Cybersecurity." Journal of Electronics,Computer Networking and Applied Mathematics, no. 45 (September 27, 2024): 16–26. http://dx.doi.org/10.55529/jecnam.45.16.26.
Full textZunaida Sitorus, Adittya Pratama, Oky Adinata Hidayatullah, and Adi Widarma. "Model Data Mining Klasifikasi Serangan Siber untuk Deteksi Dini Serangan Menggunakan Algoritma Random Forest." CESS (Journal of Computer Engineering, System and Science) 10, no. 1 (2025): 335–46. https://doi.org/10.24114/cess.v10i1.65940.
Full textJain*, Pratik, Ravikant Kholwal, and Tavneet Singh Khurana. "Reducing the False Alarm Rate in Intrusion Detection System by Providing Authentication and Improving the Efficiency of Intrusion Detection System by using Filtered Clusterer Algorithm using Weka Tool." International Journal of Engineering and Advanced Technology 10, no. 4 (2021): 134–42. http://dx.doi.org/10.35940/ijeat.d2413.0410421.
Full textJain*, Pratik, Ravikant Kholwal, and Muskan Patidar. "To Decrease the Issue of False Alarm Rate by Providing Authentication & Thus Improving the Efficiency of Intrusion Detection System by Comparing the Result of Filtered Clusterer Algorithm & Make-Density Based Clustering Algorithm without Attribute Count." International Journal of Recent Technology and Engineering 10, no. 1 (2021): 110–20. http://dx.doi.org/10.35940/ijrte.a5755.0510121.
Full textKumar, Gulshan, and Krishan Kumar. "Design of an Evolutionary Approach for Intrusion Detection." Scientific World Journal 2013 (2013): 1–14. http://dx.doi.org/10.1155/2013/962185.
Full textPratik, Jain, Kholwal Ravikant, and Singh Khurana Tavneet. "Reducing the False Alarm Rate in Intrusion Detection System by Providing Authentication and Improving the Efficiency of Intrusion Detection System by using Filtered Clusterer Algorithm using Weka Tool." International Journal of Engineering and Advanced Technology (IJEAT) 10, no. 4 (2021): 134–43. https://doi.org/10.35940/ijeat.D2413.0410421.
Full textPratik, Jain, Kholwal Ravikant, and Patidar Muskan. "To Decrease the Issue of False Alarm Rate by Providing Authentication & Thus Improving the Efficiency of Intrusion Detection System by Comparing the Result of Filtered Clusterer Algorithm & Make-Density Based Clustering Algorithm without Attribute Count." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 1 (2021): 110–20. https://doi.org/10.35940/ijrte.A5755.0510121.
Full textLi, Li, and Ye Yuan. "Data Preprocessing for Network Intrusion Detection." Applied Mechanics and Materials 20-23 (January 2010): 867–71. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.867.
Full textAmanYadav, Srivastav Abhishek, Tiwari Abhinandan, and Vir Singh Krishna. "Host-based Intrusion Detection System (HIDS)." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 5 (2020): 1043–49. https://doi.org/10.35940/ijeat.E9903.069520.
Full textArief, Muhammad, Made Gunawan, Agung Septiadi, et al. "A novel framework for analyzing internet of things datasets for machine learning and deep learning-based intrusion detection systems." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 2 (2024): 1574. http://dx.doi.org/10.11591/ijai.v13.i2.pp1574-1584.
Full textMuhammad, Arief, Gunawan Made, Septiadi Agung, et al. "A novel framework for analyzing internet of things datasets for machine learning and deep learning-based intrusion detection systems." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 2 (2024): 1574–84. https://doi.org/10.11591/ijai.v13.i2.pp1574-1584.
Full textDr., K. Murugan. "Performance Analysis on Anomaly Intrusion Detection in WANET Military Application." IJAPR Journal, UGC Indexed & Care Listed, April 2024 8, no. 1 (2024): 59–67. https://doi.org/10.5281/zenodo.11077162.
Full textK., Ramaiah, Sivasankar R., Sreenivasulu G., et al. "Significance of red grape extract on oxidative enzymes in the brain of male albino rat with reference to aging." Biolife 3, no. 2 (2022): 451–60. https://doi.org/10.5281/zenodo.7269502.
Full textNajar, Asma, Safaa G. Kumari, Khaled M. Makkouk, and Abderazzek Daaloul. "A Survey of Viruses Affecting Faba Bean (Vicia faba) in Tunisia Includes First Record of Soybean dwarf virus." Plant Disease 87, no. 9 (2003): 1151. http://dx.doi.org/10.1094/pdis.2003.87.9.1151b.
Full textBéRUBË, BRUNO, LINDA LEFIËVRE, LOUISE COUTU, and ROBERT SULLIVAN. "Regulation of the Epididymal Synthesis of P26h, a Hamster Sperm Protein." Journal of Andrology 17, no. 2 (1996): 104–10. http://dx.doi.org/10.1002/j.1939-4640.1996.tb01758.x.
Full text