Academic literature on the topic 'CSE-CIC-IDS-2018'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'CSE-CIC-IDS-2018.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "CSE-CIC-IDS-2018"
Chimphlee, Witcha, and Siriporn Chimphlee. "Hyperparameters optimization XGBoost for network intrusion detection using CSE-CIC-IDS 2018 dataset." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 1 (2024): 817. http://dx.doi.org/10.11591/ijai.v13.i1.pp817-826.
Full textChimphlee, Witcha, and Siriporn Chimphlee. "Hyperparameters optimization XGBoost for network intrusion detection using CSE-CIC-IDS 2018 dataset." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 1 (2024): 817–26. https://doi.org/10.11591/ijai.v13.i1.pp817-826.
Full textSongma, Surasit, Theera Sathuphan, and Thanakorn Pamutha. "Optimizing Intrusion Detection Systems in Three Phases on the CSE-CIC-IDS-2018 Dataset." Computers 12, no. 12 (2023): 245. http://dx.doi.org/10.3390/computers12120245.
Full textShyaa, Methaq A., Zurinahni Zainol, Rosni Abdullah, Mohammed Anbar, Laith Alzubaidi, and José Santamaría. "Enhanced Intrusion Detection with Data Stream Classification and Concept Drift Guided by the Incremental Learning Genetic Programming Combiner." Sensors 23, no. 7 (2023): 3736. http://dx.doi.org/10.3390/s23073736.
Full textInternational, Journal for Research In Science &. Advanced Technologies. "Cloud Computing Environment: An Effective New Intrusion Detection System." International Journal for Research In Science & Advanced Technologies 25, no. 05 (2025): 33–42. https://doi.org/10.5281/zenodo.15597744.
Full textAbuali, Khadija M., Liyth Nissirat, and Aida Al-Samawi. "Advancing Network Security with AI: SVM-Based Deep Learning for Intrusion Detection." Sensors 23, no. 21 (2023): 8959. http://dx.doi.org/10.3390/s23218959.
Full textGutiérrez-Galeano, Leopoldo, Juan-José Domínguez-Jiménez, Jörg Schäfer, and Inmaculada Medina-Bulo. "LLM-Based Cyberattack Detection Using Network Flow Statistics." Applied Sciences 15, no. 12 (2025): 6529. https://doi.org/10.3390/app15126529.
Full textR M, Balajee, and Jayanthi Kannan M K. "Intrusion Detection on AWS Cloud through Hybrid Deep Learning Algorithm." Electronics 12, no. 6 (2023): 1423. http://dx.doi.org/10.3390/electronics12061423.
Full textDini, Pierpaolo, Abdussalam Elhanashi, Andrea Begni, Sergio Saponara, Qinghe Zheng, and Kaouther Gasmi. "Overview on Intrusion Detection Systems Design Exploiting Machine Learning for Networking Cybersecurity." Applied Sciences 13, no. 13 (2023): 7507. http://dx.doi.org/10.3390/app13137507.
Full textDini, Pierpaolo, Abdussalam Elhanashi, Andrea Begni, Sergio Saponara, Qinghe Zheng, and kaouther Gasmi. "Overview on Intrusion Detection Systems Design Exploiting Machine Learning for Networking Cybersecurity." Applied Sciences 13 (June 25, 2023): 13. https://doi.org/10.3390/app13137507.
Full textBook chapters on the topic "CSE-CIC-IDS-2018"
Alozie, Chisom Elizabeth. "Feature selection and machine learning model optimization for DDoS detection." In Deep Science Publishing. Deep Science Publishing, 2025. https://doi.org/10.70593/978-93-49307-78-0_3.
Full textConference papers on the topic "CSE-CIC-IDS-2018"
Liu, Lisa, Gints Engelen, Timothy Lynar, Daryl Essam, and Wouter Joosen. "Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018." In 2022 IEEE Conference on Communications and Network Security (CNS). IEEE, 2022. http://dx.doi.org/10.1109/cns56114.2022.9947235.
Full textSaidane, Samia, Francesco Telch, Kussai Shahin, and Fabrizio Granelli. "Optimizing Intrusion Detection System Performance through Synergistic Hyperparameter Tuning and Advanced Data Processing." In 11th International Conference on Computer Science, Engineering and Information Technology. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.141411.
Full textNisha, T. N., and Dhanya Pramod. "Sequential event-based detection of network attacks on CSE CIC IDS 2018 data set – Application of GSP and IPAM Algorithm." In 2022 International Conference on Computing, Communication, Security and Intelligent Systems (IC3SIS). IEEE, 2022. http://dx.doi.org/10.1109/ic3sis54991.2022.9885438.
Full text