Journal articles on the topic 'KDD Cup 1999'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 45 journal articles for your research on the topic 'KDD Cup 1999.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lee, Sukjoon, and Donghee Shim. "Analysis for the KDD Cup 1999 Data Using the Convolutional Neural Network." Journal of Next-generation Convergence Information Services Technology 10, no. 2 (April 30, 2021): 123–32. http://dx.doi.org/10.29056/jncist.2021.04.02.
Full textSerinelli, Benedetto Marco, Anastasija Collen, and Niels Alexander Nijdam. "Training Guidance with KDD Cup 1999 and NSL-KDD Data Sets of ANIDINR: Anomaly-Based Network Intrusion Detection System." Procedia Computer Science 175 (2020): 560–65. http://dx.doi.org/10.1016/j.procs.2020.07.080.
Full textXia, Yong Xiang, Zhi Cai Shi, Yu Zhang, and Jian Dai. "A SVM Intrusion Detection Method Based on GPU." Applied Mechanics and Materials 610 (August 2014): 606–10. http://dx.doi.org/10.4028/www.scientific.net/amm.610.606.
Full textSeo, Jae-Hyun, and Yong-Hyuk Kim. "Machine-Learning Approach to Optimize SMOTE Ratio in Class Imbalance Dataset for Intrusion Detection." Computational Intelligence and Neuroscience 2018 (November 1, 2018): 1–11. http://dx.doi.org/10.1155/2018/9704672.
Full textSharma, Srishti, Yogita Gigras, Rita Chhikara, and Anuradha Dhull. "Analysis of NSL KDD Dataset Using Classification Algorithms for Intrusion Detection System." Recent Patents on Engineering 13, no. 2 (May 27, 2019): 142–47. http://dx.doi.org/10.2174/1872212112666180402122150.
Full textCheng, Guo Zhen, Dong Nian Cheng, and He Lei. "A Novel Network Traffic Anomaly Detection Based on Multi-Scale Fusion." Applied Mechanics and Materials 48-49 (February 2011): 102–5. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.102.
Full textKim, Jiyeon, Jiwon Kim, Hyunjung Kim, Minsun Shim, and Eunjung Choi. "CNN-Based Network Intrusion Detection against Denial-of-Service Attacks." Electronics 9, no. 6 (June 1, 2020): 916. http://dx.doi.org/10.3390/electronics9060916.
Full textKrishnan Sadhasivan, Dhanalakshmi, and Kannapiran Balasubramanian. "A Fusion of Multiagent Functionalities for Effective Intrusion Detection System." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6216078.
Full textObimbo, Charlie, and Matthew Jones. "Applying Variable Coe_cient functions to Self-Organizing Feature Maps for Network Intrusion Detection on the 1999 KDD Cup Dataset." Procedia Computer Science 8 (2012): 333–37. http://dx.doi.org/10.1016/j.procs.2012.01.069.
Full textAlbahar, Marwan Ali. "Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environments." Security and Communication Networks 2019 (November 18, 2019): 1–9. http://dx.doi.org/10.1155/2019/8939041.
Full textLaftah Al-Yaseen, Wathiq, Zulaiha Ali Othman, and Mohd Zakree Ahmad Nazri. "Hybrid ModifiedK-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems." Scientific World Journal 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/294761.
Full textHu, Ying, Li Min Sun, Sheng Chen Yu, Jiang Lan Huang, Xiao Ju Wang, and Hui Guo. "Coal Mine Disaster Warning Internet of Things Intrusion Detection System Based on Back Propagation Neural Network Improved by Genetic Algorithms." Applied Mechanics and Materials 441 (December 2013): 343–46. http://dx.doi.org/10.4028/www.scientific.net/amm.441.343.
Full textMuhammad, Arif Wirawan, and Faza Alameka. "Integrasi Normalized Relative Network Entropy Dan Neural Network Backpropagation (BP) Untuk Deteksi Dan Peramalan Serangan DDOS." Jurnal Rekayasa Teknologi Informasi (JURTI) 1, no. 1 (June 10, 2017): 1. http://dx.doi.org/10.30872/jurti.v1i1.630.
Full textFegade, Saurabh, Amey Bhadkamka, Kamlesh Karekar, Jaikishan Jeshnani, and Vinayak Kachare. "Network Intrusion Detection System Using C4.5 Algorithm." Journal of Communications Technology, Electronics and Computer Science 10 (March 1, 2017): 15. http://dx.doi.org/10.22385/jctecs.v10i0.139.
Full textKoryshev, Nikolay, Ilya Hodashinsky, and Alexander Shelupanov. "Building a Fuzzy Classifier Based on Whale Optimization Algorithm to Detect Network Intrusions." Symmetry 13, no. 7 (July 6, 2021): 1211. http://dx.doi.org/10.3390/sym13071211.
Full textWilson, Ryan, and Charlie Obimbo. "Improvements on Self-Organizing Feature Maps for User-to-Root and Remote-to-Local Network Intrusion Detection on the 1999 KDD Cup Dataset." International Journal for Information Security Research 2, no. 2 (June 1, 2012): 132–39. http://dx.doi.org/10.20533/ijisr.2042.4639.2012.0016.
Full textRaman, M. R. Gauthama, K. Kannan, S. K. Pal, and V. S. Shankar Sriram. "Rough Set-hypergraph-based Feature Selection Approach for Intrusion Detection Systems." Defence Science Journal 66, no. 6 (October 31, 2016): 612. http://dx.doi.org/10.14429/dsj.66.10802.
Full textJain, Pratik, and Divyansh Kumrawat. "Comparing the Result of KDD Cup 1999 Data by using K-mean Algorithm and make Density based Cluster in Intrusion Detection System by Removing the Count Attribute." International Journal of Computer Applications 175, no. 16 (September 17, 2020): 21–26. http://dx.doi.org/10.5120/ijca2020920661.
Full textRen, Min, Peiyu Liu, Zhihao Wang, and Jing Yi. "A Self-Adaptive Fuzzyc-Means Algorithm for Determining the Optimal Number of Clusters." Computational Intelligence and Neuroscience 2016 (2016): 1–12. http://dx.doi.org/10.1155/2016/2647389.
Full textChristyawan, Tomi Yahya, Ahmad Afif Supianto, and Wayan Firdaus Mahmudy. "Anomaly-based intrusion detector system using restricted growing self organizing map." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 3 (March 1, 2019): 919. http://dx.doi.org/10.11591/ijeecs.v13.i3.pp919-926.
Full textKumar, Gulshan, and Krishan Kumar. "Design of an Evolutionary Approach for Intrusion Detection." Scientific World Journal 2013 (2013): 1–14. http://dx.doi.org/10.1155/2013/962185.
Full textJain*, Pratik, Ravikant Kholwal, and Tavneet Singh Khurana. "Reducing the False Alarm Rate in Intrusion Detection System by Providing Authentication and Improving the Efficiency of Intrusion Detection System by using Filtered Clusterer Algorithm using Weka Tool." International Journal of Engineering and Advanced Technology 10, no. 4 (April 30, 2021): 134–42. http://dx.doi.org/10.35940/ijeat.d2413.0410421.
Full textJain*, Pratik, Ravikant Kholwal, and Muskan Patidar. "To Decrease the Issue of False Alarm Rate by Providing Authentication & Thus Improving the Efficiency of Intrusion Detection System by Comparing the Result of Filtered Clusterer Algorithm & Make-Density Based Clustering Algorithm without Attribute Count." International Journal of Recent Technology and Engineering 10, no. 1 (May 30, 2021): 110–20. http://dx.doi.org/10.35940/ijrte.a5755.0510121.
Full textLi, Li, and Ye Yuan. "Data Preprocessing for Network Intrusion Detection." Applied Mechanics and Materials 20-23 (January 2010): 867–71. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.867.
Full textNajar, Asma, Safaa G. Kumari, Khaled M. Makkouk, and Abderazzek Daaloul. "A Survey of Viruses Affecting Faba Bean (Vicia faba) in Tunisia Includes First Record of Soybean dwarf virus." Plant Disease 87, no. 9 (September 2003): 1151. http://dx.doi.org/10.1094/pdis.2003.87.9.1151b.
Full textBasavappa, Srisaila, Stine F. Pedersen, Nanna K. Jørgensen, J. Clive Ellory, and Else K. Hoffmann. "Swelling-Induced Arachidonic Acid Release via the 85-kDa cPLA2 in Human Neuroblastoma Cells." Journal of Neurophysiology 79, no. 3 (March 1, 1998): 1441–49. http://dx.doi.org/10.1152/jn.1998.79.3.1441.
Full textTakei, Y., K. Ando, and M. Kawakami. "Atrial natriuretic peptide in eel plasma, heart and brain characterized by homologous radioimmunoassay." Journal of Endocrinology 135, no. 2 (November 1992): 325–31. http://dx.doi.org/10.1677/joe.0.1350325.
Full textGao, Cunji, and Peter J. Newman. "PECAM-1 Inhibits Signaling Pathways That Amplify Platelet Aggregation." Blood 108, no. 11 (November 16, 2006): 1505. http://dx.doi.org/10.1182/blood.v108.11.1505.1505.
Full textStefanovic, B., C. Hellerbrand, and D. A. Brenner. "Regulatory Role of the Conserved Stem-Loop Structure at the 5′ End of Collagen α1(I) mRNA." Molecular and Cellular Biology 19, no. 6 (June 1, 1999): 4334–42. http://dx.doi.org/10.1128/mcb.19.6.4334.
Full textLevin, Nissan, and Jacob Zahavi. "The economics of selection of mail orders Drs. Zahavi and Levin are the masterminds behind the development of AMOS, a customized predictive modeling system for the Franklin Mint in Philadelphia, and GainSmarts, a general purpose data mining system that is the two-time winner of the KDD-CUP competition for the best data mining tools (1997 and 1998) sponsored by the American Association for Artificial Intelligence." Journal of Interactive Marketing 15, no. 3 (2001): 53. http://dx.doi.org/10.1002/dir.1016.abs.
Full textSalvetti, A., A. Lilienbaum, Z. Li, D. Paulin, and L. Gazzolo. "Identification of a negative element in the human vimentin promoter: modulation by the human T-cell leukemia virus type I Tax protein." Molecular and Cellular Biology 13, no. 1 (January 1993): 89–97. http://dx.doi.org/10.1128/mcb.13.1.89.
Full textSalvetti, A., A. Lilienbaum, Z. Li, D. Paulin, and L. Gazzolo. "Identification of a negative element in the human vimentin promoter: modulation by the human T-cell leukemia virus type I Tax protein." Molecular and Cellular Biology 13, no. 1 (January 1993): 89–97. http://dx.doi.org/10.1128/mcb.13.1.89-97.1993.
Full textBlencowe, B. J., M. Carmo-Fonseca, S. E. Behrens, R. Luhrmann, and A. I. Lamond. "Interaction of the human autoantigen p150 with splicing snRNPs." Journal of Cell Science 105, no. 3 (July 1, 1993): 685–97. http://dx.doi.org/10.1242/jcs.105.3.685.
Full textTsurumi, Hisashi, Naoe Goto, Masao Takemura, Takeshi Hara, Michio Sawada, Toshiki Yamada, Senji Kasahara, et al. "Serum-Soluble Tumor Necrosis Factor Receptor 2 (sTNF-R2) Level Determines Clinical Outcome in Patients with Aggressive Non-Hodgkin’s Lymphoma." Blood 104, no. 11 (November 16, 2004): 3271. http://dx.doi.org/10.1182/blood.v104.11.3271.3271.
Full textFreson, Kathleen, Veerle Labarque, Chantal Thys, Christine Wittevrongel, Rita De Vos, Richard Farndale, and Chris Van Geet. "Increased Bleeding Tendency in a Patient with Caffey Disease Due to a COL1A1 Mutation and a Defect in Platelet Morphology and Function." Blood 106, no. 11 (November 16, 2005): 736. http://dx.doi.org/10.1182/blood.v106.11.736.736.
Full textKhan, T., N. Cleaton, and T. Sheeran. "THU0594 A CASE OF TAKAYASU’S ARTERITIS IN A PATIENT WITH TUBERCULOUS LYMPHADENITIS." Annals of the Rheumatic Diseases 79, Suppl 1 (June 2020): 539.3–539. http://dx.doi.org/10.1136/annrheumdis-2020-eular.6542.
Full textWang, W., S. Yang, Z. Yu, M. Wei, L. Zhong, and H. Song. "AB1067 CASE OR FAMILY?FROM 2 CHINESE FCAS3 CHILDREN WITH PLCG2 MUTATION TO THEIR FAMILIES." Annals of the Rheumatic Diseases 79, Suppl 1 (June 2020): 1822.3–1823. http://dx.doi.org/10.1136/annrheumdis-2020-eular.862.
Full textH. Jebur, Hamid, Mohd Aizaini Maarof, and Anazida Zainal. "Defining Generic Attributes for IDS Classification." Jurnal Teknologi 74, no. 1 (April 12, 2015). http://dx.doi.org/10.11113/jt.v74.1375.
Full textVijaya Rani, S., and G. N. K. Suresh Babu. "Intrusion Detection Using Back Propagation Neural Network and Quick Reduct Algorithms." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, December 9, 2018, 317–25. http://dx.doi.org/10.32628/cseit183891.
Full textGolovko, Vladimir, and Pavel Kochurko. "INTRUSION RECOGNITION USING NEURAL NETWORKS." International Journal of Computing, August 1, 2014, 37–42. http://dx.doi.org/10.47839/ijc.4.3.360.
Full textBharti, Kusum Kumari, Sanyam Shukla, and Sweta Jain. "Intrusion detection using clustering." International Journal of Computer and Communication Technology, October 2010, 248–55. http://dx.doi.org/10.47893/ijcct.2010.1052.
Full text"Effective Parameter Optimization & Classification using Bat-Inspired Algorithm with Improving NSSA." International Journal of Engineering and Advanced Technology 9, no. 1 (October 30, 2019): 3343–49. http://dx.doi.org/10.35940/ijeat.a1498.109119.
Full textJeyakarthic, M., and A. Thirumalairaj. "Binary Grasshopper Optimization Based Feature Selection For Intrusion Detection System Using Feed Forward Neural Network Classifier." Recent Advances in Computer Science and Communications 13 (May 29, 2020). http://dx.doi.org/10.2174/2666255813999200529110158.
Full textGong, Yiguang, Yunping Liu, and Chuanyang Yin. "A novel two-phase cycle algorithm for effective cyber intrusion detection in edge computing." EURASIP Journal on Wireless Communications and Networking 2021, no. 1 (July 10, 2021). http://dx.doi.org/10.1186/s13638-021-02016-z.
Full textBartaševičius, Linas, Albertas Skurvydas, Ramutis Kairaitis, and Šarūnas Sakalauskas. "Vienkartinių dinaminių ir izometrinių pratybų poveikis keturgalvio šlaunies raumens susitraukimo ir atsipalaidavimo savybėms." Baltic Journal of Sport and Health Sciences 4, no. 75 (October 29, 2018). http://dx.doi.org/10.33607/bjshs.v4i75.406.
Full text