Journal articles on the topic 'NSL –KDD Data set'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'NSL –KDD Data set.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shukla, Alok Kumar, and Pradeep Singh. "Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection." International Journal of Information Security and Privacy 13, no. 3 (2019): 31–47. http://dx.doi.org/10.4018/ijisp.201907010102.
Full textJournal, Baghdad Science. "Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set." Baghdad Science Journal 13, no. 2 (2016): 278–90. http://dx.doi.org/10.21123/bsj.13.2.278-290.
Full textMa, Manfu, Wei Deng, Hongtong Liu, and Xinmiao Yun. "An Intrusion Detection Model based on Hybrid Classification algorithm." MATEC Web of Conferences 246 (2018): 03027. http://dx.doi.org/10.1051/matecconf/201824603027.
Full textSolekha, Novia Amilatus. "Analysis of NSL-KDD Dataset for Classification of Attacks Based on Intrusion Detection System Using Binary Logistics and Multinomial Logistics." Seminar Nasional Official Statistics 2022, no. 1 (2022): 507–20. http://dx.doi.org/10.34123/semnasoffstat.v2022i1.1138.
Full textMr., Shobhan Kumar* Mr. Naveen D.C. "IMPROVE THE ACCURACY OF CLASSIFIERS PERFORMANCE USING MACHINE LEARNING & DATA PREPROCESSED METHODS ON NSL-KDD DATA SETS." Global Journal of Engineering Science and Research Management 3, no. 5 (2016): 136–42. https://doi.org/10.5281/zenodo.53749.
Full textHashem, Soukaena, and Hafsa Adil. "Denial of Service Intrusion Detection System (IDS) Based on Naïve Bayes Classifier using NSL KDD and KDD Cup 99 Datasets." Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), no. 2 (October 9, 2021): 206–31. http://dx.doi.org/10.55562/jrucs.v40i2.200.
Full textTribak, Hind, Olga Valenzuela, Fernando Rojas, and Ignacio Rojas. "Statistical Analysis of Different Artificial Intelligent Techniques applied to Intrusion Detection System." International Journal of Systems Applications, Engineering & Development 16 (March 10, 2022): 48–55. http://dx.doi.org/10.46300/91015.2022.16.10.
Full textDeepa, Hindoliya, and Avinash Sharma Prof. "Performance Evaluation of Intrusion Detection using Linear Regression with K Nearest Neighbor." International Journal of Trend in Scientific Research and Development 4, no. 1 (2019): 255–59. https://doi.org/10.5281/zenodo.3604828.
Full textShaik, Aseena Babu, Rajeswara Reddy, Nagagopi Raju Vullam, Gondi Konda Reddy, and Subhani Shaik. "An Effective Method for Detecting Cyber Attacks on Computer Networks from the NSL-KDD Data Set." ITM Web of Conferences 74 (2025): 02001. https://doi.org/10.1051/itmconf/20257402001.
Full textKejia, Shen, Hamid Parvin, Sultan Noman Qasem, Bui Anh Tuan, and Kim-Hung Pho. "A classification model based on svm and fuzzy rough set for network intrusion detection." Journal of Intelligent & Fuzzy Systems 39, no. 5 (2020): 6801–17. http://dx.doi.org/10.3233/jifs-191621.
Full textSrinivas Akkepalli. "A Novel Framework of Anomaly-Based Network Intrusion Detection using Hybrid CNN, Bi-LSTM Deep Learning Techniques." Journal of Information Systems Engineering and Management 10, no. 19s (2025): 247–54. https://doi.org/10.52783/jisem.v10i19s.3015.
Full textRaghuvanshi, Abhishek, Umesh Kumar Singh, Guna Sekha Sajja, et al. "Intrusion Detection Using Machine Learning for Risk Mitigation in IoT-Enabled Smart Irrigation in Smart Farming." Journal of Food Quality 2022 (February 11, 2022): 1–8. http://dx.doi.org/10.1155/2022/3955514.
Full textGhosh, Partha, Meghna Bardhan, Nilabhra Roy Chowdhury, and Santanu Phadikar. "IDS Using Reinforcement Learning Automata for Preserving Security in Cloud Environment." International Journal of Information System Modeling and Design 8, no. 4 (2017): 21–37. http://dx.doi.org/10.4018/ijismd.2017100102.
Full textRzayev, B. T., I. S. Lebedev, Zh Т. Beldeubayeva, and I. M. Uvaliyeva. "IDENTIFICATION OF ROOTKITS IN NETWORK TRAFFIC WITH USING THE BAGGING OF CLASSIFIERS." Bulletin D. Serikbayev of EKTU, no. 1 (March 2024): 234–43. http://dx.doi.org/10.51885/1561-4212_2024_1_234.
Full textH., Manjunath, and Saravana Kumar. "Network Intrusion Detection System using Convolution Recurrent Neural Networks and NSL-KDD Dataset." Fusion: Practice and Applications 13, no. 1 (2023): 117–25. http://dx.doi.org/10.54216/fpa.130109.
Full textKumarShrivas, Akhilesh, and Amit Kumar Dewangan. "An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL-KDD Data Set." International Journal of Computer Applications 99, no. 15 (2014): 8–13. http://dx.doi.org/10.5120/17447-5392.
Full textDhar, Argha Chandra, Arna Roy, M. A. H. Akhand, Md Abdus Samad Kamal, and Kou Yamada. "Cascaded Machine Learning Approach with Data Augmentation for Intrusion Detection System." International Journal of Computer Network and Information Security 16, no. 4 (2024): 17–30. http://dx.doi.org/10.5815/ijcnis.2024.04.02.
Full textAnamika, Sharma, and Arun Jhapate Prof. "An Intrusion Detection System Using Singular Average Dependency Estimator in Data Mining." International Journal of Trend in Scientific Research and Development 2, no. 5 (2018): 1713–19. https://doi.org/10.31142/ijtsrd18166.
Full textSyed, Zuber Hussain, and Avinash Sharma Prof. "A Novel Approach of Intrusion Detection System Through SADE in Data Mining." International Journal of Trend in Scientific Research and Development 2, no. 6 (2018): 1579–85. https://doi.org/10.31142/ijtsrd18916.
Full textSheikhi, Saeid, and Panos Kostakos. "A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized BP Neural Network and GA-Based Feature Selection." Sensors 22, no. 23 (2022): 9318. http://dx.doi.org/10.3390/s22239318.
Full textMagdy, Mina Eshak, Ahmed M. Matter, Saleh Hussin, Doaa Hassan, and Shaimaa Ahmed Elsaid. "Anomaly-based intrusion detection system based on feature selection and majority voting." Indonesian Journal of Electrical Engineering and Computer Science 30, no. 3 (2023): 1699. http://dx.doi.org/10.11591/ijeecs.v30.i3.pp1699-1706.
Full textMina, Eshak Magdy, M. Matter Ahmed, Hussin Saleh, Hassan Doaa, and Ahmed Elsaid Shaimaa. "Anomaly-based intrusion detection system based on feature selection and majority voting." Anomaly-based intrusion detection system based on feature selection and majority voting 30, no. 3 (2023): 1699–706. https://doi.org/10.11591/ijeecs.v30.i3.pp1699-1706.
Full textGirubagari, N., T. N. Ravi, and S. Panneer Arokiaraj. "Hybrid Intelligent Anomaly Detection System Using Attention based Deep Learning Approach for Cyber Attacks Prevention." Indian Journal Of Science And Technology 17, no. 38 (2024): 3947–59. http://dx.doi.org/10.17485/ijst/v17i38.2224.
Full textN, Girubagari, N. Ravi T, and Panneer Arokiaraj S. "Hybrid Intelligent Anomaly Detection System Using Attention based Deep Learning Approach for Cyber Attacks Prevention." Indian Journal of Science and Technology 17, no. 38 (2024): 3947–59. https://doi.org/10.17485/IJST/v17i38.2224.
Full textBhakti, Nandurdikar, and Mahajan Rupesh. "Intelligent and Effective Intrusion Detection System using Machine Learning Algorithm." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 6 (2020): 237–40. https://doi.org/10.35940/ijeat.F1231.089620.
Full textLi, Aichuan, and Shujuan Yi. "Intelligent Intrusion Detection Method of Industrial Internet of Things Based on CNN-BiLSTM." Security and Communication Networks 2022 (April 4, 2022): 1–8. http://dx.doi.org/10.1155/2022/5448647.
Full textAlbulayhi, Khalid, Qasem Abu Al-Haija, Suliman A. Alsuhibany, Ananth A. Jillepalli, Mohammad Ashrafuzzaman, and Frederick T. Sheldon. "IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method." Applied Sciences 12, no. 10 (2022): 5015. http://dx.doi.org/10.3390/app12105015.
Full textAnitha Patil, Dr, and M. Srikanth Yadav. "Performance Analysis of Misuse Attack Data using Data Mining Classifiers." International Journal of Engineering & Technology 7, no. 4.36 (2018): 261–63. http://dx.doi.org/10.14419/ijet.v7i4.36.23782.
Full textSingh, Parminder, Sujatha Krishnamoorthy, Anand Nayyar, Ashish Kr Luhach, and Avinash Kaur. "Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system." International Journal of Distributed Sensor Networks 15, no. 10 (2019): 155014771988313. http://dx.doi.org/10.1177/1550147719883132.
Full textAhmim, Ahmed, and Nacira Ghoualmi Zine. "A new hierarchical intrusion detection system based on a binary tree of classifiers." Information & Computer Security 23, no. 1 (2015): 31–57. http://dx.doi.org/10.1108/ics-04-2013-0031.
Full textSALEEH, HADEEL M. SALEH, Hend Marouane, and Ahmed Fakhfakh. "A Novel Deep Learning Approach for Detecting Types of Attacks in the NSL-KDD Dataset." Babylonian Journal of Networking 2024 (September 1, 2024): 171–81. http://dx.doi.org/10.58496/bjn/2024/017.
Full textShen, Limin, Zhongkui Sun, Lei Chen, and Jiayin Feng. "Application of High-Dimensional Outlier Mining Based on the Maximum Frequent Pattern Factor in Intrusion Detection." Mathematical Problems in Engineering 2021 (June 21, 2021): 1–10. http://dx.doi.org/10.1155/2021/9234084.
Full textAsiya Begum and B.Srinivas S.P Kumar. "NETWORK TRAFFIC DETECTION THROUGH MACHINE LEARNING." international journal of engineering technology and management sciences 6, no. 6 (2022): 404–6. http://dx.doi.org/10.46647/ijetms.2022.v06i06.072.
Full textGholi Beik, Adeleh Jafar, Mohammad Ebrahim Shiri Ahmad Abadib, and Afshin Rezakhani. "Anomalies detection in the application layer with new combined methods in IoT networks." Journal of Intelligent & Fuzzy Systems 40, no. 6 (2021): 10909–18. http://dx.doi.org/10.3233/jifs-201938.
Full textAvinashR.Sonule, Kalla Mukesh, Jain Amit, and Chouhan D.S. "Unsw-Nb15 Dataset and Machine Learning Based Intrusion Detection Systems." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 2638–48. https://doi.org/10.35940/ijeat.C5809.029320.
Full textBalyan, Amit Kumar, Sachin Ahuja, Umesh Kumar Lilhore, et al. "A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method." Sensors 22, no. 16 (2022): 5986. http://dx.doi.org/10.3390/s22165986.
Full textPitafi, Shahneela, Toni Anwar, and Zubair Sharif. "An Improved Approach Based on Density-Based Spatial Clustering of Applications with a Noise Algorithm for Intrusion Detection." Journal of Hunan University Natural Sciences 49, no. 12 (2022): 67–77. http://dx.doi.org/10.55463/issn.1674-2974.49.12.7.
Full textImrana, Yakubu, Yanping Xiang, Liaqat Ali та ін. "χ2-BidLSTM: A Feature Driven Intrusion Detection System Based on χ2 Statistical Model and Bidirectional LSTM". Sensors 22, № 5 (2022): 2018. http://dx.doi.org/10.3390/s22052018.
Full textEnnaji, Sabrine, Nabil El Akkad, and Khalid Haddouch. "i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security." International Journal of Information Security and Privacy 17, no. 1 (2023): 1–17. http://dx.doi.org/10.4018/ijisp.317113.
Full textEesa, Adel S. "Rule Mining Using Particle Swarm Optimization for Intrusion Detection Systems." Academic Journal of Nawroz University 9, no. 2 (2020): 222. http://dx.doi.org/10.25007/ajnu.v9n2a816.
Full textShi, Yanyan, Gaoyuan Liu, Boxiong Yang, Yong Chen, and Zhenbao Liang. "A feature selection algorithm for PNN optimized by binary PSO and applied to smart city intrusion detection system." IC-ITECHS 5, no. 1 (2024): 33–42. https://doi.org/10.32664/ic-itechs.v5i1.1510.
Full textLudwig, Simone A. "Applying a Neural Network Ensemble to Intrusion Detection." Journal of Artificial Intelligence and Soft Computing Research 9, no. 3 (2019): 177–88. http://dx.doi.org/10.2478/jaiscr-2019-0002.
Full textHussein, Abdul Ameer Abbas Al-Khamees, Al-A'araji Nabeel, and Salih Al-Shamery Eman. "Enhancing the stability of the deep neural network using a non-constant learning rate for data stream." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 2123–30. https://doi.org/10.11591/ijece.v13i2.pp2123-2130.
Full textNayebi, F., and M. Noorimehr M.Noorimehr. "An instruction detection system with Support Vector Machine, Cuckoo-Genetic algorithm and principal component analysis." International Journal Artificial Intelligent and Informatics 3, no. 1 (2022): 1–12. http://dx.doi.org/10.33292/ijarlit.v3i1.43.
Full textAbdulrahman, Yadgar Sirwan. "Network Intrusion Detection using a Combination of Fuzzy Clustering and Ant Colony Algorithm." UHD Journal of Science and Technology 5, no. 2 (2021): 11–19. http://dx.doi.org/10.21928/uhdjst.v5n2y2021.pp11-19.
Full textHOSSAIN, Yakub, Zannatul FERDOUS, Tanzillah WAHID, Md Torikur RAHMAN, Uttam Kumar DEY, and Mohammad Amanul ISLAM. "Enhancing intrusion detection systems: Innovative deep learning approaches using CNN, RNN, DBN and autoencoders for robust network security." Applied Computer Science 21, no. 1 (2025): 111–25. https://doi.org/10.35784/acs_6667.
Full textYang, Yanqing, Kangfeng Zheng, Chunhua Wu, Xinxin Niu, and Yixian Yang. "Building an Effective Intrusion Detection System Using the Modified Density Peak Clustering Algorithm and Deep Belief Networks." Applied Sciences 9, no. 2 (2019): 238. http://dx.doi.org/10.3390/app9020238.
Full textAbbas Al-Khamees, Hussein Abdul Ameer, Nabeel Al-A'araji, and Eman Salih Al-Shamery. "Enhancing the stability of the deep neural network using a non-constant learning rate for data stream." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 2123. http://dx.doi.org/10.11591/ijece.v13i2.pp2123-2130.
Full textLiu, Qun, Zhiyong Tong, Shuiqing Wang, and Ziheng Yang. "Research on intrusion detection method based on feature selection and integrated learning." Journal of Physics: Conference Series 2221, no. 1 (2022): 012054. http://dx.doi.org/10.1088/1742-6596/2221/1/012054.
Full textSumathi, Sumathi, Sumathi Pawar, and Sunil Kumar B. L. "Hybrid chaotic bat artificial bee colony algorithm assisted hybrid machine learning based intrusion detection system." Fusion: Practice and Applications 19, no. 2 (2025): 45–63. https://doi.org/10.54216/fpa.190204.
Full text