Journal articles on the topic 'NSL-KDD'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'NSL-KDD.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bala, Ritu. "A REVIEW ON KDD CUP99 AND NSL-KDD DATASET." International Journal of Advanced Research in Computer Science 10, no. 2 (April 20, 2019): 64–67. http://dx.doi.org/10.26483/ijarcs.v10i2.6395.
Full textProtić, Danijela. "Review of KDD Cup '99, NSL-KDD and Kyoto 2006+ datasets." Vojnotehnicki glasnik 66, no. 3 (2018): 580–96. http://dx.doi.org/10.5937/vojtehg66-16670.
Full textSonawane, Sandip. "Rule Based Learning Intrusion Detection System Using KDD and NSL KDD Dataset." Prestige International Journal of Management & IT - Sanchayan 04, no. 02 (December 15, 2015): 135–45. http://dx.doi.org/10.37922/pijmit.2015.v04i02.009.
Full textPrasetyo, Arief, Luqman Affandi, and Dedi Arpandi. "IMPLEMENTASI METODE NAIVE BAYES UNTUK INTRUSION DETECTION SYSTEM (IDS)." Jurnal Informatika Polinema 4, no. 4 (August 1, 2018): 280. http://dx.doi.org/10.33795/jip.v4i4.220.
Full textMahmood, Hafza A. "Network Intrusion Detection System (NIDS) in Cloud Environment based on Hidden Naïve Bayes Multiclass Classifier." Al-Mustansiriyah Journal of Science 28, no. 2 (April 11, 2018): 134. http://dx.doi.org/10.23851/mjs.v28i2.508.
Full textSharma, Srishti, Yogita Gigras, Rita Chhikara, and Anuradha Dhull. "Analysis of NSL KDD Dataset Using Classification Algorithms for Intrusion Detection System." Recent Patents on Engineering 13, no. 2 (May 27, 2019): 142–47. http://dx.doi.org/10.2174/1872212112666180402122150.
Full textShukla, Alok Kumar, and Pradeep Singh. "Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection." International Journal of Information Security and Privacy 13, no. 3 (July 2019): 31–47. http://dx.doi.org/10.4018/ijisp.201907010102.
Full textDr.R.Venkatesh, Kavitha S, Dr Uma Maheswari N,. "Network Anomaly Detection for NSL-KDD Dataset Using Deep Learning." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 2 (March 31, 2021): 821–27. http://dx.doi.org/10.17762/itii.v9i2.419.
Full textMuhuri, Pramita Sree, Prosenjit Chatterjee, Xiaohong Yuan, Kaushik Roy, and Albert Esterline. "Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classify Network Attacks." Information 11, no. 5 (May 1, 2020): 243. http://dx.doi.org/10.3390/info11050243.
Full textChoudhary, Sarika, and Nishtha Kesswani. "Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT." Procedia Computer Science 167 (2020): 1561–73. http://dx.doi.org/10.1016/j.procs.2020.03.367.
Full textAlbahar, Marwan Ali, and Muhammad Binsawad. "Deep Autoencoders and Feedforward Networks Based on a New Regularization for Anomaly Detection." Security and Communication Networks 2020 (July 10, 2020): 1–9. http://dx.doi.org/10.1155/2020/7086367.
Full textMa, Manfu, Wei Deng, Hongtong Liu, and Xinmiao Yun. "An Intrusion Detection Model based on Hybrid Classification algorithm." MATEC Web of Conferences 246 (2018): 03027. http://dx.doi.org/10.1051/matecconf/201824603027.
Full textRavipati, Rama Devi, and Munther Abualkibash. "A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ON KDD AND NSL-KDD DATASETS." International Journal of Artificial Intelligence & Applications 10, no. 03 (May 30, 2019): 01–11. http://dx.doi.org/10.5121/ijaia.2019.10301.
Full textKhalil Alanezi, Mafaz, and Najlaa Aldabagh. "Application of Immune Complement Algorithm to NSL-KDD Intrusion Detection Dataset." AL-Rafidain Journal of Computer Sciences and Mathematics 9, no. 2 (December 1, 2012): 109–23. http://dx.doi.org/10.33899/csmj.2012.163705.
Full textHussain, Jamal, and Aishwarya Mishra. "Performance Analysis of Some Neural Network Algorithms using NSL-KDD Dataset." International Journal of Computer Trends and Technology 50, no. 1 (August 25, 2017): 43–49. http://dx.doi.org/10.14445/22312803/ijctt-v50p107.
Full textMohammadi, Shahriar, and Amin Namadchian. "A New Deep Learning Approach for Anomaly Base IDS using Memetic Classifier." International Journal of Computers Communications & Control 12, no. 5 (September 10, 2017): 677. http://dx.doi.org/10.15837/ijccc.2017.5.2972.
Full textGurung, Sandeep, Mirnal Kanti Ghose, and Aroj Subedi. "Deep Learning Approach on Network Intrusion Detection System using NSL-KDD Dataset." International Journal of Computer Network and Information Security 11, no. 3 (March 8, 2019): 8–14. http://dx.doi.org/10.5815/ijcnis.2019.03.02.
Full textSu, Tongtong, Huazhi Sun, Jinqi Zhu, Sheng Wang, and Yabo Li. "BAT: Deep Learning Methods on Network Intrusion Detection Using NSL-KDD Dataset." IEEE Access 8 (2020): 29575–85. http://dx.doi.org/10.1109/access.2020.2972627.
Full textRama Devi, Ravipati, and Munther Abualkibash. "Intrusion Detection System Classification Using Different Machine Learning Algorithms on KDD-99 and NSL-KDD Datasets - A Review Paper." International Journal of Computer Science and Information Technology 11, no. 03 (June 29, 2019): 65–80. http://dx.doi.org/10.5121/ijcsit.2019.11306.
Full textSerinelli, Benedetto Marco, Anastasija Collen, and Niels Alexander Nijdam. "Training Guidance with KDD Cup 1999 and NSL-KDD Data Sets of ANIDINR: Anomaly-Based Network Intrusion Detection System." Procedia Computer Science 175 (2020): 560–65. http://dx.doi.org/10.1016/j.procs.2020.07.080.
Full textEt. al., Gaddam Venugopal,. "A Comparative Analysis on Hybrid SVM for Network Intrusion Detection System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 2674–79. http://dx.doi.org/10.17762/turcomat.v12i2.2290.
Full textSolanki, Surbhi, Chetan Gupta, and Kalpana Rai. "A Survey on Machine Learning based Intrusion Detection System on NSL-KDD Dataset." International Journal of Computer Applications 176, no. 30 (June 18, 2020): 36–39. http://dx.doi.org/10.5120/ijca2020920343.
Full textRaj, Shiladitya, Megha Jain*, and Dr Pradeep Chouksey. "A Network Intrusion Detection System Based on Categorical Boosting Technique using NSL-KDD." Indian Journal of Cryptography and Network Security 1, no. 2 (November 10, 2021): 1–4. http://dx.doi.org/10.35940/ijcns.b1411.111221.
Full textAlom, Zahangir, Venkata Ramesh Bontupalli, and Tarek M. Taha. "Intrusion Detection Using Deep Belief Network and Extreme Learning Machine." International Journal of Monitoring and Surveillance Technologies Research 3, no. 2 (April 2015): 35–56. http://dx.doi.org/10.4018/ijmstr.2015040103.
Full textRincy N, Thomas, and Roopam Gupta. "Design and Development of an Efficient Network Intrusion Detection System Using Machine Learning Techniques." Wireless Communications and Mobile Computing 2021 (June 26, 2021): 1–35. http://dx.doi.org/10.1155/2021/9974270.
Full textP, Muneeshwari, and Kishanthini M. "A New Framework for Anomaly Detection in NSL-KDD Dataset using Hybrid Neuro-Weighted Genetic Algorithm." Journal of Computational Science and Intelligent Technologies 1, no. 1 (2020): 29–36. http://dx.doi.org/10.53409/mnaa.jcsit1105.
Full textPrakash N Kalavadekar, Mr, and Dr Shirish S. Sane. "Effect of Mutation and Crossover Probabilities on Genetic Algorithm and Signature Based Intrusion Detection System." International Journal of Engineering & Technology 7, no. 4.19 (November 27, 2018): 1011. http://dx.doi.org/10.14419/ijet.v7i4.19.28277.
Full textJournal, Baghdad Science. "Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set." Baghdad Science Journal 13, no. 2 (June 5, 2016): 278–90. http://dx.doi.org/10.21123/bsj.13.2.278-290.
Full textAlkahtani, Hasan, Theyazn H. H. Aldhyani, and Mohammed Al-Yaari. "Adaptive Anomaly Detection Framework Model Objects in Cyberspace." Applied Bionics and Biomechanics 2020 (December 9, 2020): 1–14. http://dx.doi.org/10.1155/2020/6660489.
Full textHindy, Hanan, Robert Atkinson, Christos Tachtatzis, Jean-Noël Colin, Ethan Bayne, and Xavier Bellekens. "Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection." Electronics 9, no. 10 (October 14, 2020): 1684. http://dx.doi.org/10.3390/electronics9101684.
Full textIbrahim, Naglaa, and Hana Usman. "Analysis of Basic Compounds in a Network Intrusion Detection System using NSL-KDD Data." AL-Rafidain Journal of Computer Sciences and Mathematics 10, no. 1 (March 15, 2013): 251–61. http://dx.doi.org/10.33899/csmj.2013.163456.
Full textSeong, Teh Boon, Vasaki Ponnusamy, Noor Zaman Jhanjhi, Robithoh Annur, and M. N. Talib. "A comparative analysis on traditional wired datasets and the need for wireless datasets for IoT wireless intrusion detection." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (May 1, 2021): 1165. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp1165-1176.
Full textGhosh, Partha, Meghna Bardhan, Nilabhra Roy Chowdhury, and Santanu Phadikar. "IDS Using Reinforcement Learning Automata for Preserving Security in Cloud Environment." International Journal of Information System Modeling and Design 8, no. 4 (October 2017): 21–37. http://dx.doi.org/10.4018/ijismd.2017100102.
Full textKejia, Shen, Hamid Parvin, Sultan Noman Qasem, Bui Anh Tuan, and Kim-Hung Pho. "A classification model based on svm and fuzzy rough set for network intrusion detection." Journal of Intelligent & Fuzzy Systems 39, no. 5 (November 19, 2020): 6801–17. http://dx.doi.org/10.3233/jifs-191621.
Full textLiu, Guojie, and Jianbiao Zhang. "CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network." Discrete Dynamics in Nature and Society 2020 (May 21, 2020): 1–11. http://dx.doi.org/10.1155/2020/4705982.
Full textIbrahim, Naglaa, and Hana Usman. "Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data." AL-Rafidain Journal of Computer Sciences and Mathematics 10, no. 2 (July 1, 2013): 145–58. http://dx.doi.org/10.33899/csmj.2013.163491.
Full textMohammed, Bilal, and Ekhlas K. Gbashi. "Intrusion Detection System for NSL-KDD Dataset Based on Deep Learning and Recursive Feature Elimination." Engineering and Technology Journal 39, no. 7 (July 25, 2021): 1069–79. http://dx.doi.org/10.30684/etj.v39i7.1695.
Full textOlanrewaju, Oyenike Mary, Faith Oluwatosin Echobu, and Abubakar Mogaji. "MODELLING OF AN INTRUSION DETECTION SYSTEM USING C4.5 MACHINE LEARNING ALGORITHM." FUDMA JOURNAL OF SCIENCES 4, no. 4 (June 14, 2021): 454–59. http://dx.doi.org/10.33003/fjs-2020-0404-502.
Full textXiao, Yuelei, and Xing Xiao. "An Intrusion Detection System Based on a Simplified Residual Network." Information 10, no. 11 (November 18, 2019): 356. http://dx.doi.org/10.3390/info10110356.
Full textLi, Xin, Peng Yi, Wei Wei, Yiming Jiang, and Le Tian. "LNNLS-KH: A Feature Selection Method for Network Intrusion Detection." Security and Communication Networks 2021 (January 6, 2021): 1–22. http://dx.doi.org/10.1155/2021/8830431.
Full textAwotunde, Joseph Bamidele, Chinmay Chakraborty, and Abidemi Emmanuel Adeniyi. "Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection." Wireless Communications and Mobile Computing 2021 (September 2, 2021): 1–17. http://dx.doi.org/10.1155/2021/7154587.
Full textAhmim, Ahmed, and Nacira Ghoualmi Zine. "A new hierarchical intrusion detection system based on a binary tree of classifiers." Information & Computer Security 23, no. 1 (March 9, 2015): 31–57. http://dx.doi.org/10.1108/ics-04-2013-0031.
Full textPutra, Dharma, and I. Gusti Agung Gede Arya Kadnyanana. "Implementation of Feature Selection using Information Gain Algorithm and Discretization with NSL-KDD Intrusion Detection System." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 9, no. 3 (February 18, 2021): 359. http://dx.doi.org/10.24843/jlk.2021.v09.i03.p06.
Full textAhsan, Mostofa, Rahul Gomes, Md Minhaz Chowdhury, and Kendall E. Nygard. "Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector." Journal of Cybersecurity and Privacy 1, no. 1 (March 21, 2021): 199–218. http://dx.doi.org/10.3390/jcp1010011.
Full textFarahani, Gholamreza. "Feature Selection Based on Cross-Correlation for the Intrusion Detection System." Security and Communication Networks 2020 (September 22, 2020): 1–17. http://dx.doi.org/10.1155/2020/8875404.
Full textAlzahrani, Abdulsalam O., and Mohammed J. F. Alenazi. "Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks." Future Internet 13, no. 5 (April 28, 2021): 111. http://dx.doi.org/10.3390/fi13050111.
Full textMeira, Jorge. "Comparative Results with Unsupervised Techniques in Cyber Attack Novelty Detection." Proceedings 2, no. 18 (September 17, 2018): 1191. http://dx.doi.org/10.3390/proceedings2181191.
Full textTama, Bayu Adhi, and Kyung-Hyune Rhee. "An Integration of PSO-based Feature Selection and Random Forest for Anomaly Detection in IoT Network." MATEC Web of Conferences 159 (2018): 01053. http://dx.doi.org/10.1051/matecconf/201815901053.
Full textSaraeian, Shideh, and Mahya Mohammadi Golchi. "Application of Deep Learning Technique in an Intrusion Detection System." International Journal of Computational Intelligence and Applications 19, no. 02 (June 2020): 2050016. http://dx.doi.org/10.1142/s1469026820500169.
Full textShen, Limin, Zhongkui Sun, Lei Chen, and Jiayin Feng. "Application of High-Dimensional Outlier Mining Based on the Maximum Frequent Pattern Factor in Intrusion Detection." Mathematical Problems in Engineering 2021 (June 21, 2021): 1–10. http://dx.doi.org/10.1155/2021/9234084.
Full text