Journal articles on the topic 'NSL-KDD'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'NSL-KDD.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bala, Ritu. "A REVIEW ON KDD CUP99 AND NSL-KDD DATASET." International Journal of Advanced Research in Computer Science 10, no. 2 (2019): 64–67. http://dx.doi.org/10.26483/ijarcs.v10i2.6395.
Full textProtić, Danijela. "Review of KDD Cup '99, NSL-KDD and Kyoto 2006+ datasets." Vojnotehnicki glasnik 66, no. 3 (2018): 580–96. http://dx.doi.org/10.5937/vojtehg66-16670.
Full textSonawane, Sandip. "Rule Based Learning Intrusion Detection System Using KDD and NSL KDD Dataset." Prestige International Journal of Management & IT - Sanchayan 04, no. 02 (2015): 135–45. http://dx.doi.org/10.37922/pijmit.2015.v04i02.009.
Full textPrasetyo, Arief, Luqman Affandi, and Dedi Arpandi. "IMPLEMENTASI METODE NAIVE BAYES UNTUK INTRUSION DETECTION SYSTEM (IDS)." Jurnal Informatika Polinema 4, no. 4 (2018): 280. http://dx.doi.org/10.33795/jip.v4i4.220.
Full textMahmood, Hafza A. "Network Intrusion Detection System (NIDS) in Cloud Environment based on Hidden Naïve Bayes Multiclass Classifier." Al-Mustansiriyah Journal of Science 28, no. 2 (2018): 134. http://dx.doi.org/10.23851/mjs.v28i2.508.
Full textSharma, Srishti, Yogita Gigras, Rita Chhikara, and Anuradha Dhull. "Analysis of NSL KDD Dataset Using Classification Algorithms for Intrusion Detection System." Recent Patents on Engineering 13, no. 2 (2019): 142–47. http://dx.doi.org/10.2174/1872212112666180402122150.
Full textShukla, Alok Kumar, and Pradeep Singh. "Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection." International Journal of Information Security and Privacy 13, no. 3 (2019): 31–47. http://dx.doi.org/10.4018/ijisp.201907010102.
Full textDr.R.Venkatesh, Kavitha S, Dr Uma Maheswari N,. "Network Anomaly Detection for NSL-KDD Dataset Using Deep Learning." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 2 (2021): 821–27. http://dx.doi.org/10.17762/itii.v9i2.419.
Full textMuhuri, Pramita Sree, Prosenjit Chatterjee, Xiaohong Yuan, Kaushik Roy, and Albert Esterline. "Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classify Network Attacks." Information 11, no. 5 (2020): 243. http://dx.doi.org/10.3390/info11050243.
Full textChoudhary, Sarika, and Nishtha Kesswani. "Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT." Procedia Computer Science 167 (2020): 1561–73. http://dx.doi.org/10.1016/j.procs.2020.03.367.
Full textAlbahar, Marwan Ali, and Muhammad Binsawad. "Deep Autoencoders and Feedforward Networks Based on a New Regularization for Anomaly Detection." Security and Communication Networks 2020 (July 10, 2020): 1–9. http://dx.doi.org/10.1155/2020/7086367.
Full textMa, Manfu, Wei Deng, Hongtong Liu, and Xinmiao Yun. "An Intrusion Detection Model based on Hybrid Classification algorithm." MATEC Web of Conferences 246 (2018): 03027. http://dx.doi.org/10.1051/matecconf/201824603027.
Full textRavipati, Rama Devi, and Munther Abualkibash. "A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ON KDD AND NSL-KDD DATASETS." International Journal of Artificial Intelligence & Applications 10, no. 03 (2019): 01–11. http://dx.doi.org/10.5121/ijaia.2019.10301.
Full textKhalil Alanezi, Mafaz, and Najlaa Aldabagh. "Application of Immune Complement Algorithm to NSL-KDD Intrusion Detection Dataset." AL-Rafidain Journal of Computer Sciences and Mathematics 9, no. 2 (2012): 109–23. http://dx.doi.org/10.33899/csmj.2012.163705.
Full textHussain, Jamal, and Aishwarya Mishra. "Performance Analysis of Some Neural Network Algorithms using NSL-KDD Dataset." International Journal of Computer Trends and Technology 50, no. 1 (2017): 43–49. http://dx.doi.org/10.14445/22312803/ijctt-v50p107.
Full textMohammadi, Shahriar, and Amin Namadchian. "A New Deep Learning Approach for Anomaly Base IDS using Memetic Classifier." International Journal of Computers Communications & Control 12, no. 5 (2017): 677. http://dx.doi.org/10.15837/ijccc.2017.5.2972.
Full textGurung, Sandeep, Mirnal Kanti Ghose, and Aroj Subedi. "Deep Learning Approach on Network Intrusion Detection System using NSL-KDD Dataset." International Journal of Computer Network and Information Security 11, no. 3 (2019): 8–14. http://dx.doi.org/10.5815/ijcnis.2019.03.02.
Full textSu, Tongtong, Huazhi Sun, Jinqi Zhu, Sheng Wang, and Yabo Li. "BAT: Deep Learning Methods on Network Intrusion Detection Using NSL-KDD Dataset." IEEE Access 8 (2020): 29575–85. http://dx.doi.org/10.1109/access.2020.2972627.
Full textRama Devi, Ravipati, and Munther Abualkibash. "Intrusion Detection System Classification Using Different Machine Learning Algorithms on KDD-99 and NSL-KDD Datasets - A Review Paper." International Journal of Computer Science and Information Technology 11, no. 03 (2019): 65–80. http://dx.doi.org/10.5121/ijcsit.2019.11306.
Full textSerinelli, Benedetto Marco, Anastasija Collen, and Niels Alexander Nijdam. "Training Guidance with KDD Cup 1999 and NSL-KDD Data Sets of ANIDINR: Anomaly-Based Network Intrusion Detection System." Procedia Computer Science 175 (2020): 560–65. http://dx.doi.org/10.1016/j.procs.2020.07.080.
Full textEt. al., Gaddam Venugopal,. "A Comparative Analysis on Hybrid SVM for Network Intrusion Detection System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 2674–79. http://dx.doi.org/10.17762/turcomat.v12i2.2290.
Full textSolanki, Surbhi, Chetan Gupta, and Kalpana Rai. "A Survey on Machine Learning based Intrusion Detection System on NSL-KDD Dataset." International Journal of Computer Applications 176, no. 30 (2020): 36–39. http://dx.doi.org/10.5120/ijca2020920343.
Full textRaj, Shiladitya, Megha Jain*, and Dr Pradeep Chouksey. "A Network Intrusion Detection System Based on Categorical Boosting Technique using NSL-KDD." Indian Journal of Cryptography and Network Security 1, no. 2 (2021): 1–4. http://dx.doi.org/10.35940/ijcns.b1411.111221.
Full textAlom, Zahangir, Venkata Ramesh Bontupalli, and Tarek M. Taha. "Intrusion Detection Using Deep Belief Network and Extreme Learning Machine." International Journal of Monitoring and Surveillance Technologies Research 3, no. 2 (2015): 35–56. http://dx.doi.org/10.4018/ijmstr.2015040103.
Full textRincy N, Thomas, and Roopam Gupta. "Design and Development of an Efficient Network Intrusion Detection System Using Machine Learning Techniques." Wireless Communications and Mobile Computing 2021 (June 26, 2021): 1–35. http://dx.doi.org/10.1155/2021/9974270.
Full textP, Muneeshwari, and Kishanthini M. "A New Framework for Anomaly Detection in NSL-KDD Dataset using Hybrid Neuro-Weighted Genetic Algorithm." Journal of Computational Science and Intelligent Technologies 1, no. 1 (2020): 29–36. http://dx.doi.org/10.53409/mnaa.jcsit1105.
Full textPrakash N Kalavadekar, Mr, and Dr Shirish S. Sane. "Effect of Mutation and Crossover Probabilities on Genetic Algorithm and Signature Based Intrusion Detection System." International Journal of Engineering & Technology 7, no. 4.19 (2018): 1011. http://dx.doi.org/10.14419/ijet.v7i4.19.28277.
Full textJournal, Baghdad Science. "Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set." Baghdad Science Journal 13, no. 2 (2016): 278–90. http://dx.doi.org/10.21123/bsj.13.2.278-290.
Full textAlkahtani, Hasan, Theyazn H. H. Aldhyani, and Mohammed Al-Yaari. "Adaptive Anomaly Detection Framework Model Objects in Cyberspace." Applied Bionics and Biomechanics 2020 (December 9, 2020): 1–14. http://dx.doi.org/10.1155/2020/6660489.
Full textHindy, Hanan, Robert Atkinson, Christos Tachtatzis, Jean-Noël Colin, Ethan Bayne, and Xavier Bellekens. "Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection." Electronics 9, no. 10 (2020): 1684. http://dx.doi.org/10.3390/electronics9101684.
Full textIbrahim, Naglaa, and Hana Usman. "Analysis of Basic Compounds in a Network Intrusion Detection System using NSL-KDD Data." AL-Rafidain Journal of Computer Sciences and Mathematics 10, no. 1 (2013): 251–61. http://dx.doi.org/10.33899/csmj.2013.163456.
Full textSeong, Teh Boon, Vasaki Ponnusamy, Noor Zaman Jhanjhi, Robithoh Annur, and M. N. Talib. "A comparative analysis on traditional wired datasets and the need for wireless datasets for IoT wireless intrusion detection." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 1165. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp1165-1176.
Full textGhosh, Partha, Meghna Bardhan, Nilabhra Roy Chowdhury, and Santanu Phadikar. "IDS Using Reinforcement Learning Automata for Preserving Security in Cloud Environment." International Journal of Information System Modeling and Design 8, no. 4 (2017): 21–37. http://dx.doi.org/10.4018/ijismd.2017100102.
Full textKejia, Shen, Hamid Parvin, Sultan Noman Qasem, Bui Anh Tuan, and Kim-Hung Pho. "A classification model based on svm and fuzzy rough set for network intrusion detection." Journal of Intelligent & Fuzzy Systems 39, no. 5 (2020): 6801–17. http://dx.doi.org/10.3233/jifs-191621.
Full textLiu, Guojie, and Jianbiao Zhang. "CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network." Discrete Dynamics in Nature and Society 2020 (May 21, 2020): 1–11. http://dx.doi.org/10.1155/2020/4705982.
Full textIbrahim, Naglaa, and Hana Usman. "Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data." AL-Rafidain Journal of Computer Sciences and Mathematics 10, no. 2 (2013): 145–58. http://dx.doi.org/10.33899/csmj.2013.163491.
Full textMohammed, Bilal, and Ekhlas K. Gbashi. "Intrusion Detection System for NSL-KDD Dataset Based on Deep Learning and Recursive Feature Elimination." Engineering and Technology Journal 39, no. 7 (2021): 1069–79. http://dx.doi.org/10.30684/etj.v39i7.1695.
Full textOlanrewaju, Oyenike Mary, Faith Oluwatosin Echobu, and Abubakar Mogaji. "MODELLING OF AN INTRUSION DETECTION SYSTEM USING C4.5 MACHINE LEARNING ALGORITHM." FUDMA JOURNAL OF SCIENCES 4, no. 4 (2021): 454–59. http://dx.doi.org/10.33003/fjs-2020-0404-502.
Full textXiao, Yuelei, and Xing Xiao. "An Intrusion Detection System Based on a Simplified Residual Network." Information 10, no. 11 (2019): 356. http://dx.doi.org/10.3390/info10110356.
Full textLi, Xin, Peng Yi, Wei Wei, Yiming Jiang, and Le Tian. "LNNLS-KH: A Feature Selection Method for Network Intrusion Detection." Security and Communication Networks 2021 (January 6, 2021): 1–22. http://dx.doi.org/10.1155/2021/8830431.
Full textAwotunde, Joseph Bamidele, Chinmay Chakraborty, and Abidemi Emmanuel Adeniyi. "Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection." Wireless Communications and Mobile Computing 2021 (September 2, 2021): 1–17. http://dx.doi.org/10.1155/2021/7154587.
Full textAhmim, Ahmed, and Nacira Ghoualmi Zine. "A new hierarchical intrusion detection system based on a binary tree of classifiers." Information & Computer Security 23, no. 1 (2015): 31–57. http://dx.doi.org/10.1108/ics-04-2013-0031.
Full textPutra, Dharma, and I. Gusti Agung Gede Arya Kadnyanana. "Implementation of Feature Selection using Information Gain Algorithm and Discretization with NSL-KDD Intrusion Detection System." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 9, no. 3 (2021): 359. http://dx.doi.org/10.24843/jlk.2021.v09.i03.p06.
Full textAhsan, Mostofa, Rahul Gomes, Md Minhaz Chowdhury, and Kendall E. Nygard. "Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector." Journal of Cybersecurity and Privacy 1, no. 1 (2021): 199–218. http://dx.doi.org/10.3390/jcp1010011.
Full textFarahani, Gholamreza. "Feature Selection Based on Cross-Correlation for the Intrusion Detection System." Security and Communication Networks 2020 (September 22, 2020): 1–17. http://dx.doi.org/10.1155/2020/8875404.
Full textAlzahrani, Abdulsalam O., and Mohammed J. F. Alenazi. "Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks." Future Internet 13, no. 5 (2021): 111. http://dx.doi.org/10.3390/fi13050111.
Full textMeira, Jorge. "Comparative Results with Unsupervised Techniques in Cyber Attack Novelty Detection." Proceedings 2, no. 18 (2018): 1191. http://dx.doi.org/10.3390/proceedings2181191.
Full textTama, Bayu Adhi, and Kyung-Hyune Rhee. "An Integration of PSO-based Feature Selection and Random Forest for Anomaly Detection in IoT Network." MATEC Web of Conferences 159 (2018): 01053. http://dx.doi.org/10.1051/matecconf/201815901053.
Full textSaraeian, Shideh, and Mahya Mohammadi Golchi. "Application of Deep Learning Technique in an Intrusion Detection System." International Journal of Computational Intelligence and Applications 19, no. 02 (2020): 2050016. http://dx.doi.org/10.1142/s1469026820500169.
Full textShen, Limin, Zhongkui Sun, Lei Chen, and Jiayin Feng. "Application of High-Dimensional Outlier Mining Based on the Maximum Frequent Pattern Factor in Intrusion Detection." Mathematical Problems in Engineering 2021 (June 21, 2021): 1–10. http://dx.doi.org/10.1155/2021/9234084.
Full text