Journal articles on the topic 'CSE-CIC-IDS-2018'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 36 journal articles for your research on the topic 'CSE-CIC-IDS-2018.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chimphlee, Witcha, and Siriporn Chimphlee. "Hyperparameters optimization XGBoost for network intrusion detection using CSE-CIC-IDS 2018 dataset." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 1 (2024): 817. http://dx.doi.org/10.11591/ijai.v13.i1.pp817-826.
Full textChimphlee, Witcha, and Siriporn Chimphlee. "Hyperparameters optimization XGBoost for network intrusion detection using CSE-CIC-IDS 2018 dataset." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 1 (2024): 817–26. https://doi.org/10.11591/ijai.v13.i1.pp817-826.
Full textSongma, Surasit, Theera Sathuphan, and Thanakorn Pamutha. "Optimizing Intrusion Detection Systems in Three Phases on the CSE-CIC-IDS-2018 Dataset." Computers 12, no. 12 (2023): 245. http://dx.doi.org/10.3390/computers12120245.
Full textShyaa, Methaq A., Zurinahni Zainol, Rosni Abdullah, Mohammed Anbar, Laith Alzubaidi, and José Santamaría. "Enhanced Intrusion Detection with Data Stream Classification and Concept Drift Guided by the Incremental Learning Genetic Programming Combiner." Sensors 23, no. 7 (2023): 3736. http://dx.doi.org/10.3390/s23073736.
Full textInternational, Journal for Research In Science &. Advanced Technologies. "Cloud Computing Environment: An Effective New Intrusion Detection System." International Journal for Research In Science & Advanced Technologies 25, no. 05 (2025): 33–42. https://doi.org/10.5281/zenodo.15597744.
Full textAbuali, Khadija M., Liyth Nissirat, and Aida Al-Samawi. "Advancing Network Security with AI: SVM-Based Deep Learning for Intrusion Detection." Sensors 23, no. 21 (2023): 8959. http://dx.doi.org/10.3390/s23218959.
Full textGutiérrez-Galeano, Leopoldo, Juan-José Domínguez-Jiménez, Jörg Schäfer, and Inmaculada Medina-Bulo. "LLM-Based Cyberattack Detection Using Network Flow Statistics." Applied Sciences 15, no. 12 (2025): 6529. https://doi.org/10.3390/app15126529.
Full textR M, Balajee, and Jayanthi Kannan M K. "Intrusion Detection on AWS Cloud through Hybrid Deep Learning Algorithm." Electronics 12, no. 6 (2023): 1423. http://dx.doi.org/10.3390/electronics12061423.
Full textDini, Pierpaolo, Abdussalam Elhanashi, Andrea Begni, Sergio Saponara, Qinghe Zheng, and Kaouther Gasmi. "Overview on Intrusion Detection Systems Design Exploiting Machine Learning for Networking Cybersecurity." Applied Sciences 13, no. 13 (2023): 7507. http://dx.doi.org/10.3390/app13137507.
Full textDini, Pierpaolo, Abdussalam Elhanashi, Andrea Begni, Sergio Saponara, Qinghe Zheng, and kaouther Gasmi. "Overview on Intrusion Detection Systems Design Exploiting Machine Learning for Networking Cybersecurity." Applied Sciences 13 (June 25, 2023): 13. https://doi.org/10.3390/app13137507.
Full textImanbayev, Azamat, Sakhybay Tynymbayev, Roman Odarchenko, et al. "Research of Machine Learning Algorithms for the Development of Intrusion Detection Systems in 5G Mobile Networks and Beyond." Sensors 22, no. 24 (2022): 9957. http://dx.doi.org/10.3390/s22249957.
Full textChimphlee, Siriporn, and Witcha Chimphlee. "Machine learning to improve the performance of anomaly-based network intrusion detection in big data." Indonesian Journal of Electrical Engineering and Computer Science 30, no. 2 (2023): 1106. http://dx.doi.org/10.11591/ijeecs.v30.i2.pp1106-1119.
Full textCikambasi, Ciza Lukogo, Lawrence Mwenda Muriira, and Robert Mutua Murungi. "Deep Learning Network Intrusion Detection with the Conv1d-Lstm Model: Integrating CNN and LSTM For Superior Performance." International Journal of Professional Practice 12, no. 4 (2024): 41–49. https://doi.org/10.71274/ijpp.v12i4.475.
Full textSiriporn, Chimphlee, and Chimphlee Witcha. "Machine learning to improve the performance of anomalybased network intrusion detection in big data." Machine learning to improve the performance of anomalybased network intrusion detection in big data 30, no. 2 (2023): 1106–19. https://doi.org/10.11591/ijeecs.v30.i2.pp1106-1119.
Full textKharismadhany, Ekky, Maretha Ruswiansari, and Tri Harsono. "Brute-force Detection Using Ensemble Classification." INTEK: Jurnal Penelitian 9, no. 2 (2023): 98. http://dx.doi.org/10.31963/intek.v9i2.3550.
Full textUllah, Safi, Muazzam A. Khan, Jawad Ahmad, et al. "HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles." Sensors 22, no. 4 (2022): 1340. http://dx.doi.org/10.3390/s22041340.
Full textNajafi Mohsenabad, Hadi, and Mehmet Ali Tut. "Optimizing Cybersecurity Attack Detection in Computer Networks: A Comparative Analysis of Bio-Inspired Optimization Algorithms Using the CSE-CIC-IDS 2018 Dataset." Applied Sciences 14, no. 3 (2024): 1044. http://dx.doi.org/10.3390/app14031044.
Full textSongma, Surasit, Watcharakorn Netharn, and Siriluck Lorpunmanee. "Extending Network Intrusion Detection with Enhanced Particle Swarm Optimization Techniques." International journal of Computer Networks & Communications 16, no. 4 (2024): 61–85. http://dx.doi.org/10.5121/ijcnc.2024.16404.
Full textBhaskara, I. Made Wasanta, I. Putu Gede Hendra Suputra, I. Made Widiartha, I. Gusti Agung Gede Arya Kadyanan, I. Gusti Ngurah Anom Cahyadi Putra, and Ida Bagus Gede Dwidasmara. "Klasifikasi Serangan Distributed Denial of Service (DDoS) Menggunakan Random Forest Dengan CFS." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 11, no. 2 (2022): 215. http://dx.doi.org/10.24843/jlk.2022.v11.i02.p01.
Full textBakro, Mhamad, Rakesh Ranjan Kumar, Amerah A. Alabrah, et al. "Efficient Intrusion Detection System in the Cloud Using Fusion Feature Selection Approaches and an Ensemble Classifier." Electronics 12, no. 11 (2023): 2427. http://dx.doi.org/10.3390/electronics12112427.
Full textPrabu, K., and P. Sudhakar. "A hybrid deep learning approach for enhanced network intrusion detection." Indonesian Journal of Electrical Engineering and Computer Science 33, no. 3 (2024): 1915. http://dx.doi.org/10.11591/ijeecs.v33.i3.pp1915-1923.
Full textPrabu, K., and P. Sudhakar. "A hybrid deep learning approach for enhanced network intrusion detection." Indonesian Journal of Electrical Engineering and Computer Science 33, no. 3 (2024): 1915–23. https://doi.org/10.11591/ijeecs.v33.i3.pp1915-1923.
Full textShrestha, Rakesh, Atefeh Omidkar, Sajjad Ahmadi Roudi, Robert Abbas, and Shiho Kim. "Machine-Learning-Enabled Intrusion Detection System for Cellular Connected UAV Networks." Electronics 10, no. 13 (2021): 1549. http://dx.doi.org/10.3390/electronics10131549.
Full textLin, Hsiao-Chung, Ping Wang, Kuo-Ming Chao, Wen-Hui Lin, and Zong-Yu Yang. "Ensemble Learning for Threat Classification in Network Intrusion Detection on a Security Monitoring System for Renewable Energy." Applied Sciences 11, no. 23 (2021): 11283. http://dx.doi.org/10.3390/app112311283.
Full textDai, Qian-yi, Bin Zhang, and Shu-qin Dong. "A DDoS-Attack Detection Method Oriented to the Blockchain Network Layer." Security and Communication Networks 2022 (May 4, 2022): 1–18. http://dx.doi.org/10.1155/2022/5692820.
Full textWang, Tianfeng, Yingying Xu, and Zhenzhou Tang. "Toward fast network intrusion detection for web services: partial-flow feature extraction and dataset construction." International Journal of Web Information Systems, December 17, 2024. https://doi.org/10.1108/ijwis-09-2024-0261.
Full text-, Radhika S. K., Ashwini S. P. -, and Dr Jalesh Kumar -. "A Survey on different Machine Learning algorithms that are compatible with CSE-CIC IDS 2018 Dataset." International Journal For Multidisciplinary Research 6, no. 6 (2024). http://dx.doi.org/10.36948/ijfmr.2024.v06i06.29927.
Full textSingh, Himanshu, and Mahima Bansal. "Empirical Analysis of Machine Learning Techniques for Intrusion Detection in Network System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 02 (2023). http://dx.doi.org/10.55041/ijsrem17734.
Full textWu, Chunwang, Xiaolei Liu, Kangyi Ding, et al. "Attack detection model for BCoT based on contrastive variational autoencoder and metric learning." Journal of Cloud Computing 13, no. 1 (2024). http://dx.doi.org/10.1186/s13677-024-00678-w.
Full textKumar, P. Manoj, M. Parvathy, and C. Abinaya Devi. "An Intelligent Approach for Intrusion Detection using Convolutional Neural Network." Journal of Network Security Computer Networks 8, no. 1 (2022). http://dx.doi.org/10.46610/jonscn.2022.v08i01.001.
Full textAlexander Moudiappa, Vinolia, Kanya Nataraj, and Veeramalai Natarajan Rajavarman. "Intrusion Detection System: An Ensemble Deep Learning Approach for Cloud Computing Using EBWO." CURRENT APPLIED SCIENCE AND TECHNOLOGY, January 22, 2025, e0262276. https://doi.org/10.55003/cast.2025.262276.
Full textPrasad, Arvind, and Shalini Chandra. "Machine learning to combat cyberattack: a survey of datasets and challenges." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, May 1, 2022, 154851292210948. http://dx.doi.org/10.1177/15485129221094881.
Full textMenezes, R. Julian, P. Jesu Jayarin, and A. Chandra Sekar. "A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems." Journal of Cloud Computing 13, no. 1 (2024). http://dx.doi.org/10.1186/s13677-024-00657-1.
Full textLiu, Haitian, Rong Jiang, and Bin Zhou. "An ensemble approach for unsupervised anomaly and cyber attack detection." Journal of Computer Security, May 11, 2025. https://doi.org/10.1177/0926227x251330216.
Full textAzeez, Nureni A., Taiwo O. Odeyemi, Chioma C. Isiekwene, and Ademola P. Abidoye. "Cyber Attack Detection in A Global Network Using Machine Learning Approach." FUOYE Journal of Engineering and Technology 8, no. 4 (2023). http://dx.doi.org/10.46792/fuoyejet.v8i4.1113.
Full textRaghunath Kumar Babu, D., and A. Packialatha. "Cyber-attack Detection and Mitigation Process under Big Data Consideration: Improved Recursive Feature Elimination-based Feature Selection." Journal of Information & Knowledge Management, September 20, 2024. http://dx.doi.org/10.1142/s0219649224500795.
Full text