Review of KDD Cup '99, NSL-KDD and Kyoto 2006+ datasets
暂无分享,去创建一个
[1] Wolfgang Kinzel,et al. Neural cryptography , 2002, Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02..
[2] A. Malathi,et al. A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection , 2013 .
[3] Harish Kumar,et al. An intrusion detection system using network traffic profiling and online sequential extreme learning machine , 2015, Expert Syst. Appl..
[4] Joshua Alspector,et al. Data duplication: an imbalance problem ? , 2003 .
[5] A O Adetunmbi,et al. Auto-Immunity Dendritic Cell Algorithm , 2016 .
[6] C. S. Ravichandran,et al. Efficient Classifier for R2L and U2R Attacks , 2012 .
[7] Syed Zainudeen Mohd Said,et al. A Subset Feature Elimination Mechanism for Intrusion Detection System , 2016 .
[8] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[9] Swati Paliwal,et al. Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm , 2012 .
[10] Sudhir Kumar Sharma,et al. Analysis of KDD Dataset Attributes - Class wise for Intrusion Detection , 2015 .
[11] Hiroki Takakura,et al. Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation , 2011, BADGERS '11.