Journal articles on the topic 'CIC-DDoS2019 dataset'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 47 journal articles for your research on the topic 'CIC-DDoS2019 dataset.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Deris Stiawan, Deris Stiawan, Dimas Wahyudi Deris Stiawan, Tri Wanda Septian Dimas Wahyudi, Mohd Yazid Idris Tri Wanda Septian, and Rahmat Budiarto Mohd Yazid Idris. "The Development of an Internet of Things (IoT) Network Traffic Dataset with Simulated Attack Data." 網際網路技術學刊 24, no. 2 (2023): 345–56. http://dx.doi.org/10.53106/160792642023032402013.
Full textZaki, Rana M., and Inam S. Naser. "Hybrid Classifier for Detecting Zero-Day Attacks on IoT Networks." Mesopotamian Journal of CyberSecurity 4, no. 3 (2024): 59–74. http://dx.doi.org/10.58496/mjcs/2024/016.
Full textMa, Ruikui, Xuebin Chen, and Ran Zhai. "A DDoS Attack Detection Method Based on Natural Selection of Features and Models." Electronics 12, no. 4 (2023): 1059. http://dx.doi.org/10.3390/electronics12041059.
Full textAhmad, Iftikhar, Muhammad Imran, Abdul Qayyum, Muhammad Sher Ramzan, and Madini O. Alassafi. "An Optimized Hybrid Deep Intrusion Detection Model (HD-IDM) for Enhancing Network Security." Mathematics 11, no. 21 (2023): 4501. http://dx.doi.org/10.3390/math11214501.
Full textD’hooge, Laurens, Miel Verkerken, Tim Wauters, Filip De Turck, and Bruno Volckaert. "Investigating Generalized Performance of Data-Constrained Supervised Machine Learning Models on Novel, Related Samples in Intrusion Detection." Sensors 23, no. 4 (2023): 1846. http://dx.doi.org/10.3390/s23041846.
Full textFerrag, Mohamed Amine, Lei Shu, Hamouda Djallel, and Kim-Kwang Raymond Choo. "Deep Learning-Based Intrusion Detection for Distributed Denial of Service Attack in Agriculture 4.0." Electronics 10, no. 11 (2021): 1257. http://dx.doi.org/10.3390/electronics10111257.
Full textXu, Hao, and Hequn Xian. "SCD: A Detection System for DDoS Attacks based on SAE-CNN Networks." Frontiers in Computing and Intelligent Systems 5, no. 3 (2023): 94–99. http://dx.doi.org/10.54097/fcis.v5i3.13865.
Full textWilliams, Brandon, and Lijun Qian. "Semi-Supervised Learning for Intrusion Detection in Large Computer Networks." Applied Sciences 15, no. 11 (2025): 5930. https://doi.org/10.3390/app15115930.
Full textYzzogh, Hicham, and Hafssa Benaboud. "Enhancing SDN security with a feature-based approach using multiple k-means, Word2Vec, and neural network." Bulletin of Electrical Engineering and Informatics 14, no. 2 (2025): 1456–67. https://doi.org/10.11591/eei.v14i2.8834.
Full textZ, Syauqii Fayyadh Hilal, and Rushendra Rushendra. "The Efficiency of Machine Learning Techniques in Strengthening Defenses Against DDoS Attacks, Such as Random Forest, Logistic Regression, and Neural Networks." sinkron 9, no. 1 (2025): 520–30. https://doi.org/10.33395/sinkron.v9i1.14502.
Full textZegarra Rodríguez, Demóstenes, Ogobuchi Daniel Okey, Siti Sarah Maidin, Ekikere Umoren Udo, and João Henrique Kleinschmidt. "Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection." PLOS ONE 18, no. 10 (2023): e0286652. http://dx.doi.org/10.1371/journal.pone.0286652.
Full textAldhyani, Theyazn H. H., and Hasan Alkahtani. "Cyber Security for Detecting Distributed Denial of Service Attacks in Agriculture 4.0: Deep Learning Model." Mathematics 11, no. 1 (2023): 233. http://dx.doi.org/10.3390/math11010233.
Full textAhmed, Ahmed, Noor D. AL AL-Shakarchy, and Mais Saad Safoq. "Early DDoS Attack Detection Using Lightweight Deep Neural Network." Fusion: Practice and Applications 19, no. 2 (2025): 392–401. https://doi.org/10.54216/fpa.190228.
Full textKanber, Bassam M., Naglaa F. Noaman, Amr M. H. Saeed, and Mansoor Malas. "DDoS Attacks Detection in the Application Layer Using Three Level Machine Learning Classification Architecture." International Journal of Computer Network and Information Security 14, no. 3 (2022): 33–46. http://dx.doi.org/10.5815/ijcnis.2022.03.03.
Full textSoim, Sopian, Sholihin Sholihin, and Cahyo Bayu Subianto. "Optimizing Performance Random Forest Algorithm Using Correlation-Based Feature Selection (CFS) Method to Improve Distributed Denial of Service (DDoS) Attack Detection Accuracy." Indonesian Journal of Artificial Intelligence and Data Mining 7, no. 2 (2024): 220. http://dx.doi.org/10.24014/ijaidm.v7i2.24783.
Full textChartuni, Andrés, and José Márquez. "Multi-Classifier of DDoS Attacks in Computer Networks Built on Neural Networks." Applied Sciences 11, no. 22 (2021): 10609. http://dx.doi.org/10.3390/app112210609.
Full textBabić, Ivan, Aleksandar Miljković, Milan Čabarkapa, et al. "Triple Modular Redundancy Optimization for Threshold Determination in Intrusion Detection Systems." Symmetry 13, no. 4 (2021): 557. http://dx.doi.org/10.3390/sym13040557.
Full textYuliswar, Teddy, Ikhwana Elfitri, and Onno W purbo. "Optimization of Intrusion Detection System with Machine Learning for Detecting Distributed Attacks on Server." INOVTEK Polbeng - Seri Informatika 10, no. 1 (2025): 367–76. https://doi.org/10.35314/vem9da98.
Full textMa, Ruikui, Qiuqian Wang, Xiangxi Bu, and Xuebin Chen. "Real-Time Detection of DDoS Attacks Based on Random Forest in SDN." Applied Sciences 13, no. 13 (2023): 7872. http://dx.doi.org/10.3390/app13137872.
Full textDasari, Kishore Babu, and Nagaraju Devarakonda. "Detection of TCP-Based DDoS Attacks with SVM Classification with Different Kernel Functions Using Common Uncorrelated Feature Subsets." International Journal of Safety and Security Engineering 12, no. 2 (2022): 239–49. http://dx.doi.org/10.18280/ijsse.120213.
Full textAli, Basheer Husham, Nasri Sulaiman, Syed Abdul Rahman Al-Haddad, Rodziah Atan, Siti Lailatul Mohd Hassan, and Mokhalad Alghrairi. "Identification of Distributed Denial of Services Anomalies by Using Combination of Entropy and Sequential Probabilities Ratio Test Methods." Sensors 21, no. 19 (2021): 6453. http://dx.doi.org/10.3390/s21196453.
Full textZhu, Yuanjiao, Yanling Chen, Jingsong Li, et al. "The DDoS Attack Detection for Information Systems of High-Penetration Renewable Energy Grids Based on TCN-BiLSTM." Journal of Physics: Conference Series 3022, no. 1 (2025): 012006. https://doi.org/10.1088/1742-6596/3022/1/012006.
Full textNavya, Vattikonda Anuj Kumar Gupta Achuthananda Reddy Polu Bhumeka Narra Dheeraj Varun Kumar Reddy Buddula and Hari Hara Sudheer Patchipulusu. "Machine Learning-Based Approaches for Detecting and Mitigating Distributed Denial of Service (DDoS) Attacks to Improved Cloud Security." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN MULTIDISCIPLINARY EDUCATION 3, no. 12 (2024): 1993–64. https://doi.org/10.5281/zenodo.15340752.
Full textKaliyaperumal, Karthikeyan, Raja Sarath Kumar Boddu, Sai Kiran Oruganti, Guidsa Tesema Kebesa, Mohsen Aghaeiboorkheili, and Rajendran Bhojan. "An Efficient Technique for Identifying Distributed Denial ofService Active Assaults Using Deep Neural Networks Based on the Adaptive System Intelligence Paradigm." International Journal of Basic and Applied Sciences 14, no. 2 (2025): 577–90. https://doi.org/10.14419/dwfxsc41.
Full textPeng, Silin, Yu Han, Ruonan Li, Lichen Liu, Jie Liu, and Zhaoquan Gu. "ROSE-BOX: A Lightweight and Efficient Intrusion Detection Framework for Resource-Constrained IIoT Environments." Applied Sciences 15, no. 12 (2025): 6448. https://doi.org/10.3390/app15126448.
Full textFang, Menghao, Yixiang Wang, Liangbin Yang, et al. "Reinventing Web Security: An Enhanced Cycle-Consistent Generative Adversarial Network Approach to Intrusion Detection." Electronics 13, no. 9 (2024): 1711. http://dx.doi.org/10.3390/electronics13091711.
Full textAnukriti Naithani, Shailendra Narayan Singh. "Quantum-Enhanced Ddos Detection in 5G Cloud Networks using Bottleneck Attention Mechanism." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 1409–26. https://doi.org/10.52783/cana.v32.4166.
Full textBerríos, Sebastián, Sebastián Garcia, Pamela Hermosilla, and Héctor Allende-Cid. "A Machine-Learning-Based Approach for the Detection and Mitigation of Distributed Denial-of-Service Attacks in Internet of Things Environments." Applied Sciences 15, no. 11 (2025): 6012. https://doi.org/10.3390/app15116012.
Full textAlshdadi, Abdulrahman A., Abdulwahab Ali Almazroi, Nasir Ayub, et al. "Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks." Future Internet 17, no. 2 (2025): 88. https://doi.org/10.3390/fi17020088.
Full textXu, Wen, Julian Jang-Jaccard, Tong Liu, Fariza Sabrina, and Jin Kwak. "Improved Bidirectional GAN-Based Approach for Network Intrusion Detection Using One-Class Classifier." Computers 11, no. 6 (2022): 85. http://dx.doi.org/10.3390/computers11060085.
Full textMills, Godfrey A., Daniel K. Acquah, and Robert A. Sowah. "Network Intrusion Detection and Prevention System Using Hybrid Machine Learning with Supervised Ensemble Stacking Model." Journal of Computer Networks and Communications 2024, no. 1 (2024). http://dx.doi.org/10.1155/2024/5775671.
Full textİnce, Uğur, and Gülşah Karaduman. "Classification of Distributed Denial of Service Attacks Using Machine Learning Methods." NATURENGS MTU Journal of Engineering and Natural Sciences Malatya Turgut Ozal University, May 1, 2024. http://dx.doi.org/10.46572/naturengs.1450965.
Full text"COMPARATIVE ANALYSIS OF MACHINE LEARNING METHODS FOR NETWORK TRAFFIC BINARY CLASSIFICATION." Infokommunikacionnye tehnologii, March 28, 2025, 20–26. https://doi.org/10.18469/ikt.2024.22.2.03.
Full textWang, Bangli, Yuxuan Jiang, You Liao, and Zhen Li. "DDoS‐MSCT: A DDoS Attack Detection Method Based on Multiscale Convolution and Transformer." IET Information Security 2024, no. 1 (2024). http://dx.doi.org/10.1049/2024/1056705.
Full textHicham, Yzzogh, and Benaboud Hafssa. "Enhancing SDN security with a feature-based approach using multiple k-means, Word2Vec, and neural network." March 5, 2025. https://doi.org/10.11591/eei.v14i2.8834.
Full textAlslman, Yasmeen, Ashwaq Khalil, Remah Younisse, Eman AlNagi, Jaafer Saraireh, and Rawan Ghnemat. "DDoS Attacks Detection Approach based on Ensemble Model using Spark." Jordanian Journal of Computers and Information Technology, 2024, 1. http://dx.doi.org/10.5455/jjcit.71-1694806966.
Full textRoopak, Monika, Simon Parkinson, Gui Yun Tian, Yachao Ran, Saad Khan, and Balasubramaniyan Chandrasekaran. "An unsupervised approach for the detection of zero‐day distributed denial of service attacks in Internet of Things networks." IET Networks, October 8, 2024. http://dx.doi.org/10.1049/ntw2.12134.
Full textFerdous, Farhan Sadik, Tapu Biswas, and Akinul Islam Jony. "Enhancing Cybersecurity: Machine Learning Approaches for Predicting DDoS Attack." Malaysian Journal of Science and Advanced Technology, July 4, 2024, 249–55. http://dx.doi.org/10.56532/mjsat.v4i3.306.
Full textHossain, Md Alamgir. "Enhanced Ensemble-Based Distributed Denial-of-Service (DDoS) Attack Detection with Novel Feature Selection: A Robust Cybersecurity Approach." Artificial Intelligence Evolution, August 24, 2023, 165–86. http://dx.doi.org/10.37256/aie.4220233337.
Full textGuzman-Brand, Victor Alfonso, and Laura Gelvez-Garcia. "Identificación de ataques de denegación de servicio distribuido (DDoS) mediante la integración de algoritmos de aprendizaje automático y arquitecturas de redes neuronales artificiales." Revista Ingeniería, Matemáticas y Ciencias de la Información 12, no. 23 (2025). https://doi.org/10.21017/rimci.1116.
Full textRashid Najam, Nora, and Razan Abdulhammed Abduljawad. "RF-RFE-SMOTE: A DoS And DDoS Attack Detection Framework." NTU Journal of Engineering and Technology 2, no. 2 (2023). http://dx.doi.org/10.56286/ntujet.v2i2.436.
Full textPrasad, Arvind, and Shalini Chandra. "Machine learning to combat cyberattack: a survey of datasets and challenges." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, May 1, 2022, 154851292210948. http://dx.doi.org/10.1177/15485129221094881.
Full textLalduhsaka, R., and Ajoy Kumar Khan. "Enhanced Intrusion Detection System Using a Two‐Staged Feature Selection Method." SECURITY AND PRIVACY 8, no. 3 (2025). https://doi.org/10.1002/spy2.70025.
Full textLi, Guo, and MingHua Wang. "A Meta-learning Approach for Few-shot Network Intrusion Detection Using Depthwise Separable Convolution." Journal of ICT Standardization, March 10, 2025, 443–70. https://doi.org/10.13052/jicts2245-800x.1245.
Full textMahdi, Zaed S., Rana M. Zaki, and Laith Alzubaidi. "Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks." SECURITY AND PRIVACY, October 2024. http://dx.doi.org/10.1002/spy2.471.
Full textAyad, Aya G., Nehal A. Sakr, and Noha A. Hikal. "A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks." Journal of Supercomputing, August 29, 2024. http://dx.doi.org/10.1007/s11227-024-06409-x.
Full textPrasath, J. S., V. Irine Shyja, P. Chandrakanth, Boddepalli Kiran Kumar, and Adam Raja Basha. "An optimal secure defense mechanism for DDoS attack in IoT network using feature optimization and intrusion detection system." Journal of Intelligent & Fuzzy Systems, January 19, 2024, 1–18. http://dx.doi.org/10.3233/jifs-235529.
Full text