نتایج جستجو برای: kdd cup 99

تعداد نتایج: 84698  

Journal: :IEEE Access 2021

The popularity and usage of Cloud computing is increasing rapidly. Several companies are investing in this field either for their own use or to provide it as a service others. One the results development emergence various security problems both industry consumer. ways secure by using Machine Learning (ML). ML techniques have been used prevent detect attacks gaps on Cloud. In paper, we Systemati...

Journal: :SIGKDD Explorations 2000
Daniel A. Keim Alexander Hinneburg

The SIGMOD conference organized by the ACM Special Interest Group on Management of Data is one of the major conferences in the database area. Since databases play an important role in knowledge discovery, the SIGMOD conference is also an important forum for researchers in the KDD area, especially with respect to aspects of KDD which deal with very large data sets. At this years SIGMOD conferenc...

Journal: :Computers & Security 2005
Yun Wang

Although researchers have long studied using statistical modeling techniques to detect anomaly intrusion and profile user behavior, the feasibility of applying multinomial logistic regression modeling to predict multi-attack types has not been addressed, and the risk factors associated with individual major attacks remain unclear. To address the gaps, this study used the KDD-cup 1999 data and b...

2012
Zhao Zheng Tianqi Chen Nathan Nan Liu Qiang Yang Yong Yu

The Yahoo! music rating data set in KDD Cup 2011 raises several interesting challenges: (1) The data covers a lengthy time period of more than eight years. (2) Not only are training ratings associated date and time information, so are the test ratings. (3) The items form a hierarchy consisting of four types of items: genres, artists, albums and tracks. To capture the rich temporal dynamics with...

2017
Liyuan Xiao Ying Cai Hailiang Liu

In order to defend against extraordinary intelligent attacks in the era of rapidly growing information and technology nowadays, effective and efficient intrusion detection models are needed to detect and prevent intrusion promptly. Bayesian network (BN) classifiers with powerful reasoning capabilities have been increasingly utilized to detect intrusion attacks with reasonable accuracy and effic...

Journal: : 2023

Intrusion detection systems IDS are increasingly utilizing machine learning methods. IDSs important tools for ensuring the security of network data and resources. The Internet Things (IoT) is an expanding intelligent machines sensors. However, they vulnerable to attackers because ubiquitous extensive IoT networks. Datasets from intrusion (IDS) have been analyzed deep methods such as Bidirection...

Journal: :Journal of Big Data 2023

Abstract Due to the increasing growth of Internet and its widespread application, number attacks on network has also increased. Therefore, maintaining security using intrusion detection systems is critical importance. The connection between devices leads a large data being generated saved. era “big data” emerges over time. This paper presents new method for selecting effective features based co...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد گرمسار - دانشکده مهندسی کامپیوتر 1392

از آنجایی که از نظر تکنیکی ایجاد سیستم های کامپیوتری بدون نقاط ضعف و شکست امنیتی عملأ غیرممکن است، امنیت به بخشی مهم و چالش برانگیزی در شبکه های کامپیوتری و سیستم های اطلاعاتی سازمانی تبدیل شده است. استفاده از سیستم های تشخیص نفوذ از راه کارهای ارائه شده موجود برای ارتقا امنیت و مقابله با نفوذگران سایبری می باشد. این سیستم ها که می توانند سخت افزاری و یا نرم افزاری باشند، کار نظارت بر شبکه کامپ...

Journal: :Global Journal of Engineering and Technology Advances 2021

These days, security threats detection, generally discussed to as intrusion, has befitted actual significant and serious problem in network, information data security. Thus, an intrusion detection system (IDS) important element computer or network Avoidance of such intrusions wholly bases on ability Intrusion Detection System which productions necessary job it identifies different kinds attacks...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید