Academic literature on the topic 'NSL –KDD Data set'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'NSL –KDD Data set.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "NSL –KDD Data set"
Shukla, Alok Kumar, and Pradeep Singh. "Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection." International Journal of Information Security and Privacy 13, no. 3 (2019): 31–47. http://dx.doi.org/10.4018/ijisp.201907010102.
Full textJournal, Baghdad Science. "Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set." Baghdad Science Journal 13, no. 2 (2016): 278–90. http://dx.doi.org/10.21123/bsj.13.2.278-290.
Full textMa, Manfu, Wei Deng, Hongtong Liu, and Xinmiao Yun. "An Intrusion Detection Model based on Hybrid Classification algorithm." MATEC Web of Conferences 246 (2018): 03027. http://dx.doi.org/10.1051/matecconf/201824603027.
Full textSolekha, Novia Amilatus. "Analysis of NSL-KDD Dataset for Classification of Attacks Based on Intrusion Detection System Using Binary Logistics and Multinomial Logistics." Seminar Nasional Official Statistics 2022, no. 1 (2022): 507–20. http://dx.doi.org/10.34123/semnasoffstat.v2022i1.1138.
Full textMr., Shobhan Kumar* Mr. Naveen D.C. "IMPROVE THE ACCURACY OF CLASSIFIERS PERFORMANCE USING MACHINE LEARNING & DATA PREPROCESSED METHODS ON NSL-KDD DATA SETS." Global Journal of Engineering Science and Research Management 3, no. 5 (2016): 136–42. https://doi.org/10.5281/zenodo.53749.
Full textHashem, Soukaena, and Hafsa Adil. "Denial of Service Intrusion Detection System (IDS) Based on Naïve Bayes Classifier using NSL KDD and KDD Cup 99 Datasets." Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), no. 2 (October 9, 2021): 206–31. http://dx.doi.org/10.55562/jrucs.v40i2.200.
Full textTribak, Hind, Olga Valenzuela, Fernando Rojas, and Ignacio Rojas. "Statistical Analysis of Different Artificial Intelligent Techniques applied to Intrusion Detection System." International Journal of Systems Applications, Engineering & Development 16 (March 10, 2022): 48–55. http://dx.doi.org/10.46300/91015.2022.16.10.
Full textDeepa, Hindoliya, and Avinash Sharma Prof. "Performance Evaluation of Intrusion Detection using Linear Regression with K Nearest Neighbor." International Journal of Trend in Scientific Research and Development 4, no. 1 (2019): 255–59. https://doi.org/10.5281/zenodo.3604828.
Full textShaik, Aseena Babu, Rajeswara Reddy, Nagagopi Raju Vullam, Gondi Konda Reddy, and Subhani Shaik. "An Effective Method for Detecting Cyber Attacks on Computer Networks from the NSL-KDD Data Set." ITM Web of Conferences 74 (2025): 02001. https://doi.org/10.1051/itmconf/20257402001.
Full textKejia, Shen, Hamid Parvin, Sultan Noman Qasem, Bui Anh Tuan, and Kim-Hung Pho. "A classification model based on svm and fuzzy rough set for network intrusion detection." Journal of Intelligent & Fuzzy Systems 39, no. 5 (2020): 6801–17. http://dx.doi.org/10.3233/jifs-191621.
Full textDissertations / Theses on the topic "NSL –KDD Data set"
Petersen, Rebecca. "Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28002.
Full textEngen, Vegard. "Machine learning for network based intrusion detection : an investigation into discrepancies in findings with the KDD cup '99 data set and multi-objective evolution of neural network classifier ensembles from imbalanced data." Thesis, Bournemouth University, 2010. http://eprints.bournemouth.ac.uk/15899/.
Full textBook chapters on the topic "NSL –KDD Data set"
Cholakoska, Ana, Martina Shushlevska, Zdravko Todorov, and Danijela Efnusheva. "Analysis of Machine Learning Classification Techniques for Anomaly Detection with NSL-KDD Data Set." In Lecture Notes in Networks and Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90321-3_21.
Full textSingh, Kuldeep, Lakhwinder Kaur, and Raman Maini. "Comparison of Principle Component Analysis and Stacked Autoencoder on NSL-KDD Dataset." In Computational Methods and Data Engineering. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6876-3_17.
Full textPhilo Prasanna, I., and M. Suguna. "Detection of Distributed Denial of Service Attack Using NSL-KDD Dataset - A Survey." In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43192-1_94.
Full textHota, H. S., and Akhilesh Kumar Shrivas. "Decision Tree Techniques Applied on NSL-KDD Data and Its Comparison with Various Feature Selection Techniques." In Smart Innovation, Systems and Technologies. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07353-8_24.
Full textMohanty, Subrat, Satendra Kumar, and Mayank Agarwal. "Enhancing Accuracy with Recursive Feature Selection Using Multiple Machine Learning and Deep Learning Techniques on NSL-KDD Dataset." In Advances in Data-Driven Computing and Intelligent Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9518-9_18.
Full textGu, Jie. "An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature Augmentation." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_10.
Full textKrivchenkov, Aleksandr, Boriss Misnevs, and Alexander Grakovski. "Structural Analysis of the NSL-KDD Data Sets for Solving the Problem of Attacks Detection Using ML/DL Methods." In Lecture Notes in Networks and Systems. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96196-1_1.
Full textPriyalakshmi, V., and R. Devi. "Analysis and Implementation of Normalisation Techniques on KDD’99 Data Set for IDS and IPS." In Proceedings of International Conference on Data Science and Applications. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-6634-7_5.
Full textSammy. F, Dr, Dr Meenakshi, Dr Umesh Kumar Singh, Dr Malik Jawarneh, and Dr Abhishek Raghuvanshi. "MACHINE LEARNING TECHNIQUES FOR DESIGN OF INTRUSION DETECTION SYSTEM FOR BIG DATA NETWORKS." In Futuristic Trends in Network & Communication Technologies Volume 3 Book 3. Iterative International Publishers, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/v3binc3p4ch1.
Full textYu, Yan. "Application and Effectiveness Analysis of Deep Reinforcement Learning in Computer Network Traffic Management." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2025. https://doi.org/10.3233/faia250314.
Full textConference papers on the topic "NSL –KDD Data set"
E, Elakkiya, Bhavana Chukka, Krishna Sai Teja Kadiyam, Poojitha Pulagam, and S. Antony Raj. "Hybrid Models for Ehanced Intrusion Detection on NSL KDD and KDD CUP 99 Data Set." In 2025 4th OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 5.0. IEEE, 2025. https://doi.org/10.1109/otcon65728.2025.11070981.
Full textG. Pardeshi, Nilesh, and Dipak V. Patil. "Binary and Multiclass Classification Intrusion Detection System using Benchmark NSL-KDD and Machine Learning Models." In 2024 International Conference on Data Science and Network Security (ICDSNS). IEEE, 2024. http://dx.doi.org/10.1109/icdsns62112.2024.10691256.
Full textSaranya, R., and S. Silvia Priscila. "Enhancing Network Security: An Intrusion Detection Approach Using Artificial Neural Networks and NSL-KDD Dataset." In 2024 International Conference on Data Science and Network Security (ICDSNS). IEEE, 2024. http://dx.doi.org/10.1109/icdsns62112.2024.10691303.
Full textThomas, Rajesh, and Deepa Pavithran. "A Survey of Intrusion Detection Models based on NSL-KDD Data Set." In 2018 Fifth HCT Information Technology Trends (ITT). IEEE, 2018. http://dx.doi.org/10.1109/ctit.2018.8649498.
Full textAlvarez Almeida, Luis Alfredo, and Juan Carlos Martinez Santos. "Evaluating Features Selection on NSL-KDD Data-Set to Train a Support Vector Machine-Based Intrusion Detection System." In 2019 IEEE Colombian Conference on Applications in Computational Intelligence (ColCACI). IEEE, 2019. http://dx.doi.org/10.1109/colcaci.2019.8781803.
Full textRoy, Sandipan, Apurbo Mandal, and Debraj Dey. "Intelligent Intrusion Detection System using Supervised Learning." In Intelligent Computing and Technologies Conference. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.115.3.
Full text"Feature Selection using Attribute Ratio in NSL-KDD data." In International Conference Data Mining, Civil and Mechanical Engineering. International Institute of Engineers, 2014. http://dx.doi.org/10.15242/iie.e0214081.
Full textPaulauskas, Nerijus, and Juozas Auskalnis. "Analysis of data pre-processing influence on intrusion detection using NSL-KDD dataset." In 2017 Open Conference of Electrical, Electronic and Information Sciences (eStream). IEEE, 2017. http://dx.doi.org/10.1109/estream.2017.7950325.
Full textShah, Muhammad Huzaifa, Muhammad Abu Bakar, Raja Hashim Ali, et al. "Investigating novel machine learning based intrusion detection models for NSL-KDD data sets." In 2023 International Conference on IT and Industrial Technologies (ICIT). IEEE, 2023. http://dx.doi.org/10.1109/icit59216.2023.10335831.
Full textShehadeh, Aseel, Hanan ALTaweel, and Abdallah Qusef. "Analysis of Data Mining Techniques on KDD-Cup'99, NSL-KDD and UNSW-NB15 Datasets for Intrusion Detection." In 2023 24th International Arab Conference on Information Technology (ACIT). IEEE, 2023. http://dx.doi.org/10.1109/acit58888.2023.10453884.
Full text