Статті в журналах з теми "KDD Cup 1999"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-45 статей у журналах для дослідження на тему "KDD Cup 1999".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Lee, Sukjoon, and Donghee Shim. "Analysis for the KDD Cup 1999 Data Using the Convolutional Neural Network." Journal of Next-generation Convergence Information Services Technology 10, no. 2 (April 30, 2021): 123–32. http://dx.doi.org/10.29056/jncist.2021.04.02.
Повний текст джерелаSerinelli, Benedetto Marco, Anastasija Collen, and Niels Alexander Nijdam. "Training Guidance with KDD Cup 1999 and NSL-KDD Data Sets of ANIDINR: Anomaly-Based Network Intrusion Detection System." Procedia Computer Science 175 (2020): 560–65. http://dx.doi.org/10.1016/j.procs.2020.07.080.
Повний текст джерелаXia, Yong Xiang, Zhi Cai Shi, Yu Zhang, and Jian Dai. "A SVM Intrusion Detection Method Based on GPU." Applied Mechanics and Materials 610 (August 2014): 606–10. http://dx.doi.org/10.4028/www.scientific.net/amm.610.606.
Повний текст джерелаSeo, Jae-Hyun, and Yong-Hyuk Kim. "Machine-Learning Approach to Optimize SMOTE Ratio in Class Imbalance Dataset for Intrusion Detection." Computational Intelligence and Neuroscience 2018 (November 1, 2018): 1–11. http://dx.doi.org/10.1155/2018/9704672.
Повний текст джерелаSharma, Srishti, Yogita Gigras, Rita Chhikara, and Anuradha Dhull. "Analysis of NSL KDD Dataset Using Classification Algorithms for Intrusion Detection System." Recent Patents on Engineering 13, no. 2 (May 27, 2019): 142–47. http://dx.doi.org/10.2174/1872212112666180402122150.
Повний текст джерелаCheng, Guo Zhen, Dong Nian Cheng, and He Lei. "A Novel Network Traffic Anomaly Detection Based on Multi-Scale Fusion." Applied Mechanics and Materials 48-49 (February 2011): 102–5. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.102.
Повний текст джерелаKim, Jiyeon, Jiwon Kim, Hyunjung Kim, Minsun Shim, and Eunjung Choi. "CNN-Based Network Intrusion Detection against Denial-of-Service Attacks." Electronics 9, no. 6 (June 1, 2020): 916. http://dx.doi.org/10.3390/electronics9060916.
Повний текст джерелаKrishnan Sadhasivan, Dhanalakshmi, and Kannapiran Balasubramanian. "A Fusion of Multiagent Functionalities for Effective Intrusion Detection System." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6216078.
Повний текст джерелаObimbo, Charlie, and Matthew Jones. "Applying Variable Coe_cient functions to Self-Organizing Feature Maps for Network Intrusion Detection on the 1999 KDD Cup Dataset." Procedia Computer Science 8 (2012): 333–37. http://dx.doi.org/10.1016/j.procs.2012.01.069.
Повний текст джерелаAlbahar, Marwan Ali. "Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environments." Security and Communication Networks 2019 (November 18, 2019): 1–9. http://dx.doi.org/10.1155/2019/8939041.
Повний текст джерелаLaftah Al-Yaseen, Wathiq, Zulaiha Ali Othman, and Mohd Zakree Ahmad Nazri. "Hybrid ModifiedK-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems." Scientific World Journal 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/294761.
Повний текст джерелаHu, Ying, Li Min Sun, Sheng Chen Yu, Jiang Lan Huang, Xiao Ju Wang, and Hui Guo. "Coal Mine Disaster Warning Internet of Things Intrusion Detection System Based on Back Propagation Neural Network Improved by Genetic Algorithms." Applied Mechanics and Materials 441 (December 2013): 343–46. http://dx.doi.org/10.4028/www.scientific.net/amm.441.343.
Повний текст джерелаMuhammad, Arif Wirawan, and Faza Alameka. "Integrasi Normalized Relative Network Entropy Dan Neural Network Backpropagation (BP) Untuk Deteksi Dan Peramalan Serangan DDOS." Jurnal Rekayasa Teknologi Informasi (JURTI) 1, no. 1 (June 10, 2017): 1. http://dx.doi.org/10.30872/jurti.v1i1.630.
Повний текст джерелаFegade, Saurabh, Amey Bhadkamka, Kamlesh Karekar, Jaikishan Jeshnani, and Vinayak Kachare. "Network Intrusion Detection System Using C4.5 Algorithm." Journal of Communications Technology, Electronics and Computer Science 10 (March 1, 2017): 15. http://dx.doi.org/10.22385/jctecs.v10i0.139.
Повний текст джерелаKoryshev, Nikolay, Ilya Hodashinsky, and Alexander Shelupanov. "Building a Fuzzy Classifier Based on Whale Optimization Algorithm to Detect Network Intrusions." Symmetry 13, no. 7 (July 6, 2021): 1211. http://dx.doi.org/10.3390/sym13071211.
Повний текст джерелаWilson, Ryan, and Charlie Obimbo. "Improvements on Self-Organizing Feature Maps for User-to-Root and Remote-to-Local Network Intrusion Detection on the 1999 KDD Cup Dataset." International Journal for Information Security Research 2, no. 2 (June 1, 2012): 132–39. http://dx.doi.org/10.20533/ijisr.2042.4639.2012.0016.
Повний текст джерелаRaman, M. R. Gauthama, K. Kannan, S. K. Pal, and V. S. Shankar Sriram. "Rough Set-hypergraph-based Feature Selection Approach for Intrusion Detection Systems." Defence Science Journal 66, no. 6 (October 31, 2016): 612. http://dx.doi.org/10.14429/dsj.66.10802.
Повний текст джерелаJain, Pratik, and Divyansh Kumrawat. "Comparing the Result of KDD Cup 1999 Data by using K-mean Algorithm and make Density based Cluster in Intrusion Detection System by Removing the Count Attribute." International Journal of Computer Applications 175, no. 16 (September 17, 2020): 21–26. http://dx.doi.org/10.5120/ijca2020920661.
Повний текст джерелаRen, Min, Peiyu Liu, Zhihao Wang, and Jing Yi. "A Self-Adaptive Fuzzyc-Means Algorithm for Determining the Optimal Number of Clusters." Computational Intelligence and Neuroscience 2016 (2016): 1–12. http://dx.doi.org/10.1155/2016/2647389.
Повний текст джерелаChristyawan, Tomi Yahya, Ahmad Afif Supianto, and Wayan Firdaus Mahmudy. "Anomaly-based intrusion detector system using restricted growing self organizing map." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 3 (March 1, 2019): 919. http://dx.doi.org/10.11591/ijeecs.v13.i3.pp919-926.
Повний текст джерелаKumar, Gulshan, and Krishan Kumar. "Design of an Evolutionary Approach for Intrusion Detection." Scientific World Journal 2013 (2013): 1–14. http://dx.doi.org/10.1155/2013/962185.
Повний текст джерелаJain*, Pratik, Ravikant Kholwal, and Tavneet Singh Khurana. "Reducing the False Alarm Rate in Intrusion Detection System by Providing Authentication and Improving the Efficiency of Intrusion Detection System by using Filtered Clusterer Algorithm using Weka Tool." International Journal of Engineering and Advanced Technology 10, no. 4 (April 30, 2021): 134–42. http://dx.doi.org/10.35940/ijeat.d2413.0410421.
Повний текст джерелаJain*, Pratik, Ravikant Kholwal, and Muskan Patidar. "To Decrease the Issue of False Alarm Rate by Providing Authentication & Thus Improving the Efficiency of Intrusion Detection System by Comparing the Result of Filtered Clusterer Algorithm & Make-Density Based Clustering Algorithm without Attribute Count." International Journal of Recent Technology and Engineering 10, no. 1 (May 30, 2021): 110–20. http://dx.doi.org/10.35940/ijrte.a5755.0510121.
Повний текст джерелаLi, Li, and Ye Yuan. "Data Preprocessing for Network Intrusion Detection." Applied Mechanics and Materials 20-23 (January 2010): 867–71. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.867.
Повний текст джерелаNajar, Asma, Safaa G. Kumari, Khaled M. Makkouk, and Abderazzek Daaloul. "A Survey of Viruses Affecting Faba Bean (Vicia faba) in Tunisia Includes First Record of Soybean dwarf virus." Plant Disease 87, no. 9 (September 2003): 1151. http://dx.doi.org/10.1094/pdis.2003.87.9.1151b.
Повний текст джерелаBasavappa, Srisaila, Stine F. Pedersen, Nanna K. Jørgensen, J. Clive Ellory, and Else K. Hoffmann. "Swelling-Induced Arachidonic Acid Release via the 85-kDa cPLA2 in Human Neuroblastoma Cells." Journal of Neurophysiology 79, no. 3 (March 1, 1998): 1441–49. http://dx.doi.org/10.1152/jn.1998.79.3.1441.
Повний текст джерелаTakei, Y., K. Ando, and M. Kawakami. "Atrial natriuretic peptide in eel plasma, heart and brain characterized by homologous radioimmunoassay." Journal of Endocrinology 135, no. 2 (November 1992): 325–31. http://dx.doi.org/10.1677/joe.0.1350325.
Повний текст джерелаGao, Cunji, and Peter J. Newman. "PECAM-1 Inhibits Signaling Pathways That Amplify Platelet Aggregation." Blood 108, no. 11 (November 16, 2006): 1505. http://dx.doi.org/10.1182/blood.v108.11.1505.1505.
Повний текст джерелаStefanovic, B., C. Hellerbrand та D. A. Brenner. "Regulatory Role of the Conserved Stem-Loop Structure at the 5′ End of Collagen α1(I) mRNA". Molecular and Cellular Biology 19, № 6 (1 червня 1999): 4334–42. http://dx.doi.org/10.1128/mcb.19.6.4334.
Повний текст джерелаLevin, Nissan, and Jacob Zahavi. "The economics of selection of mail orders Drs. Zahavi and Levin are the masterminds behind the development of AMOS, a customized predictive modeling system for the Franklin Mint in Philadelphia, and GainSmarts, a general purpose data mining system that is the two-time winner of the KDD-CUP competition for the best data mining tools (1997 and 1998) sponsored by the American Association for Artificial Intelligence." Journal of Interactive Marketing 15, no. 3 (2001): 53. http://dx.doi.org/10.1002/dir.1016.abs.
Повний текст джерелаSalvetti, A., A. Lilienbaum, Z. Li, D. Paulin, and L. Gazzolo. "Identification of a negative element in the human vimentin promoter: modulation by the human T-cell leukemia virus type I Tax protein." Molecular and Cellular Biology 13, no. 1 (January 1993): 89–97. http://dx.doi.org/10.1128/mcb.13.1.89.
Повний текст джерелаSalvetti, A., A. Lilienbaum, Z. Li, D. Paulin, and L. Gazzolo. "Identification of a negative element in the human vimentin promoter: modulation by the human T-cell leukemia virus type I Tax protein." Molecular and Cellular Biology 13, no. 1 (January 1993): 89–97. http://dx.doi.org/10.1128/mcb.13.1.89-97.1993.
Повний текст джерелаBlencowe, B. J., M. Carmo-Fonseca, S. E. Behrens, R. Luhrmann, and A. I. Lamond. "Interaction of the human autoantigen p150 with splicing snRNPs." Journal of Cell Science 105, no. 3 (July 1, 1993): 685–97. http://dx.doi.org/10.1242/jcs.105.3.685.
Повний текст джерелаTsurumi, Hisashi, Naoe Goto, Masao Takemura, Takeshi Hara, Michio Sawada, Toshiki Yamada, Senji Kasahara, et al. "Serum-Soluble Tumor Necrosis Factor Receptor 2 (sTNF-R2) Level Determines Clinical Outcome in Patients with Aggressive Non-Hodgkin’s Lymphoma." Blood 104, no. 11 (November 16, 2004): 3271. http://dx.doi.org/10.1182/blood.v104.11.3271.3271.
Повний текст джерелаFreson, Kathleen, Veerle Labarque, Chantal Thys, Christine Wittevrongel, Rita De Vos, Richard Farndale, and Chris Van Geet. "Increased Bleeding Tendency in a Patient with Caffey Disease Due to a COL1A1 Mutation and a Defect in Platelet Morphology and Function." Blood 106, no. 11 (November 16, 2005): 736. http://dx.doi.org/10.1182/blood.v106.11.736.736.
Повний текст джерелаKhan, T., N. Cleaton, and T. Sheeran. "THU0594 A CASE OF TAKAYASU’S ARTERITIS IN A PATIENT WITH TUBERCULOUS LYMPHADENITIS." Annals of the Rheumatic Diseases 79, Suppl 1 (June 2020): 539.3–539. http://dx.doi.org/10.1136/annrheumdis-2020-eular.6542.
Повний текст джерелаWang, W., S. Yang, Z. Yu, M. Wei, L. Zhong, and H. Song. "AB1067 CASE OR FAMILY?FROM 2 CHINESE FCAS3 CHILDREN WITH PLCG2 MUTATION TO THEIR FAMILIES." Annals of the Rheumatic Diseases 79, Suppl 1 (June 2020): 1822.3–1823. http://dx.doi.org/10.1136/annrheumdis-2020-eular.862.
Повний текст джерелаH. Jebur, Hamid, Mohd Aizaini Maarof, and Anazida Zainal. "Defining Generic Attributes for IDS Classification." Jurnal Teknologi 74, no. 1 (April 12, 2015). http://dx.doi.org/10.11113/jt.v74.1375.
Повний текст джерелаVijaya Rani, S., and G. N. K. Suresh Babu. "Intrusion Detection Using Back Propagation Neural Network and Quick Reduct Algorithms." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, December 9, 2018, 317–25. http://dx.doi.org/10.32628/cseit183891.
Повний текст джерелаGolovko, Vladimir, and Pavel Kochurko. "INTRUSION RECOGNITION USING NEURAL NETWORKS." International Journal of Computing, August 1, 2014, 37–42. http://dx.doi.org/10.47839/ijc.4.3.360.
Повний текст джерелаBharti, Kusum Kumari, Sanyam Shukla, and Sweta Jain. "Intrusion detection using clustering." International Journal of Computer and Communication Technology, October 2010, 248–55. http://dx.doi.org/10.47893/ijcct.2010.1052.
Повний текст джерела"Effective Parameter Optimization & Classification using Bat-Inspired Algorithm with Improving NSSA." International Journal of Engineering and Advanced Technology 9, no. 1 (October 30, 2019): 3343–49. http://dx.doi.org/10.35940/ijeat.a1498.109119.
Повний текст джерелаJeyakarthic, M., and A. Thirumalairaj. "Binary Grasshopper Optimization Based Feature Selection For Intrusion Detection System Using Feed Forward Neural Network Classifier." Recent Advances in Computer Science and Communications 13 (May 29, 2020). http://dx.doi.org/10.2174/2666255813999200529110158.
Повний текст джерелаGong, Yiguang, Yunping Liu, and Chuanyang Yin. "A novel two-phase cycle algorithm for effective cyber intrusion detection in edge computing." EURASIP Journal on Wireless Communications and Networking 2021, no. 1 (July 10, 2021). http://dx.doi.org/10.1186/s13638-021-02016-z.
Повний текст джерелаBartaševičius, Linas, Albertas Skurvydas, Ramutis Kairaitis, and Šarūnas Sakalauskas. "Vienkartinių dinaminių ir izometrinių pratybų poveikis keturgalvio šlaunies raumens susitraukimo ir atsipalaidavimo savybėms." Baltic Journal of Sport and Health Sciences 4, no. 75 (October 29, 2018). http://dx.doi.org/10.33607/bjshs.v4i75.406.
Повний текст джерела