Academic literature on the topic 'KDD Cup 1999'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'KDD Cup 1999.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "KDD Cup 1999"
Lee, Sukjoon, and Donghee Shim. "Analysis for the KDD Cup 1999 Data Using the Convolutional Neural Network." Journal of Next-generation Convergence Information Services Technology 10, no. 2 (2021): 123–32. http://dx.doi.org/10.29056/jncist.2021.04.02.
Full textEniodunmo, Oluwapelumi, and Raid Al-Aqtash. "A Predictive Model to Predict a Cyberattack Using Self Normalizing Neural Networks." International Journal of Statistics and Probability 12, no. 6 (2023): 60. http://dx.doi.org/10.5539/ijsp.v12n6p60.
Full textXia, Yong Xiang, Zhi Cai Shi, Yu Zhang, and Jian Dai. "A SVM Intrusion Detection Method Based on GPU." Applied Mechanics and Materials 610 (August 2014): 606–10. http://dx.doi.org/10.4028/www.scientific.net/amm.610.606.
Full textSeo, Jae-Hyun, and Yong-Hyuk Kim. "Machine-Learning Approach to Optimize SMOTE Ratio in Class Imbalance Dataset for Intrusion Detection." Computational Intelligence and Neuroscience 2018 (November 1, 2018): 1–11. http://dx.doi.org/10.1155/2018/9704672.
Full textMathan, Pinaki Shashishekhar. "Intrusion Detection Using Machine Learning Classification and Regression." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42130.
Full textSerinelli, Benedetto Marco, Anastasija Collen, and Niels Alexander Nijdam. "Training Guidance with KDD Cup 1999 and NSL-KDD Data Sets of ANIDINR: Anomaly-Based Network Intrusion Detection System." Procedia Computer Science 175 (2020): 560–65. http://dx.doi.org/10.1016/j.procs.2020.07.080.
Full textSharma, Srishti, Yogita Gigras, Rita Chhikara, and Anuradha Dhull. "Analysis of NSL KDD Dataset Using Classification Algorithms for Intrusion Detection System." Recent Patents on Engineering 13, no. 2 (2019): 142–47. http://dx.doi.org/10.2174/1872212112666180402122150.
Full textCheng, Guo Zhen, Dong Nian Cheng, and He Lei. "A Novel Network Traffic Anomaly Detection Based on Multi-Scale Fusion." Applied Mechanics and Materials 48-49 (February 2011): 102–5. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.102.
Full textMohammed, Mohammed, and Khattab M. Ali Alheeti. "AI-Driven Features for Intrusion Detection and Prevention Using Random Forest." Journal of Cybersecurity and Information Management 16, no. 1 (2025): 01–14. https://doi.org/10.54216/jcim.160101.
Full textKim, Jiyeon, Jiwon Kim, Hyunjung Kim, Minsun Shim, and Eunjung Choi. "CNN-Based Network Intrusion Detection against Denial-of-Service Attacks." Electronics 9, no. 6 (2020): 916. http://dx.doi.org/10.3390/electronics9060916.
Full textDissertations / Theses on the topic "KDD Cup 1999"
Вашеняк, Артем Миколайович. "Методи виявлення прихованих атак на інформаційні системи із застосуванням нечіткої логіки". Магістерська робота, Хмельницький національний університет, 2021. http://elar.khnu.km.ua/jspui/handle/123456789/11104.
Full textBooks on the topic "KDD Cup 1999"
Book chapters on the topic "KDD Cup 1999"
Wang, Yun, and Lee Seidman. "Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch159.
Full textZhang, Ji. "A Subspace-Based Analysis Method for Anomaly Detection in Large and High-Dimensional Network Connection Data Streams." In Data Mining. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2455-9.ch026.
Full textZhang, Ji. "A Dynamic Subspace Anomaly Detection Method Using Generic Algorithm for Streaming Network Data." In Handbook of Research on Emerging Developments in Data Privacy. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-7381-6.ch018.
Full textClarke, A. K. "Synechococcus sp. PCC 7942 CIpC." In Guidebook to Molecular Chaperones and Protein-Folding Catalysts. Oxford University PressOxford, 1997. http://dx.doi.org/10.1093/oso/9780198599494.003.0095.
Full textConference papers on the topic "KDD Cup 1999"
Zeng, Xiulian. "Unmasking Intruders: An In-Depth Analysis of Anomaly Detection Using the KDD Cup 1999 Dataset." In 2024 3rd International Conference on Artificial Intelligence and Computer Information Technology (AICIT). IEEE, 2024. http://dx.doi.org/10.1109/aicit62434.2024.10729979.
Full textShah, Bhavin, and Bhushan H. Trivedi. "Reducing Features of KDD CUP 1999 Dataset for Anomaly Detection Using Back Propagation Neural Network." In 2015 Fifth International Conference on Advanced Computing & Communication Technologies (ACCT). IEEE, 2015. http://dx.doi.org/10.1109/acct.2015.131.
Full textWilson, Ryan, and Charlie Obimbo. "Self-organizing feature maps for User-to-Root and Remote-to-Local network intrusion detection on the KDD Cup 1999 dataset." In 2011 World Congress on Internet Security (WorldCIS-2011). IEEE, 2011. http://dx.doi.org/10.1109/worldcis17046.2011.5749879.
Full textFank, Elias Augusto, Geomar A. Schreiner, and Denio Duarte. "Estudo comparativo de plataformas de Deep Learning: Apache Singa, Graphlab e H2O." In Escola Regional de Banco de Dados. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/erbd.2021.17234.
Full textReports on the topic "KDD Cup 1999"
Epel, Bernard L., Roger N. Beachy, A. Katz, et al. Isolation and Characterization of Plasmodesmata Components by Association with Tobacco Mosaic Virus Movement Proteins Fused with the Green Fluorescent Protein from Aequorea victoria. United States Department of Agriculture, 1999. http://dx.doi.org/10.32747/1999.7573996.bard.
Full text