Academic literature on the topic 'CSE-CIC-IDS2018'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'CSE-CIC-IDS2018.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "CSE-CIC-IDS2018"
NIKITENKO, Andrii, and Yevhen SOBOL. "AN EFFECTIVE MODEL FOR DETECTING NETWORK INTRUSIONS USING MACHINE LEARNING METHODS." cientific papers of Donetsk National Technical University. Series: Informatics, Cybernetics and Computer Science 2, no. 39 (2024): 57–65. https://doi.org/10.31474/1996-1588-2024-2-39-57-65.
Full textGhani, Ameer A., and Suad A. Alasadi. "A Deep Learning Algorithm to Cybersecurity: Enhancing Intrusion Detection with a Hybrid GRU and BiLSTM Model." Engineering, Technology & Applied Science Research 15, no. 3 (2025): 23605–12. https://doi.org/10.48084/etasr.10666.
Full textKamal, Hesham, and Maggie Mashaly. "Combined Dataset System Based on a Hybrid PCA–Transformer Model for Effective Intrusion Detection Systems." AI 6, no. 8 (2025): 168. https://doi.org/10.3390/ai6080168.
Full textAl Hwaitat, Ahmad K., and Hussam N. Fakhouri. "Adaptive Cybersecurity Neural Networks: An Evolutionary Approach for Enhanced Attack Detection and Classification." Applied Sciences 14, no. 19 (2024): 9142. http://dx.doi.org/10.3390/app14199142.
Full textAbedzadeh, Najmeh, and Matthew Jacobs. "A Reinforcement Learning Framework with Oversampling and Undersampling Algorithms for Intrusion Detection System." Applied Sciences 13, no. 20 (2023): 11275. http://dx.doi.org/10.3390/app132011275.
Full textHassan, Sardar KH, and Muhammadamin A. Daneshwar. "Anomaly-based Network Intrusion Detection System using Deep Intelligent Technique." Polytechnic Journal 12, no. 2 (2023): 100–113. http://dx.doi.org/10.25156/ptj.v12n2y2022.pp100-113.
Full textLi, Jing, Wei Zong, Yang-Wai Chow, and Willy Susilo. "Mitigating Class Imbalance in Network Intrusion Detection with Feature-Regularized GANs." Future Internet 17, no. 5 (2025): 216. https://doi.org/10.3390/fi17050216.
Full textD’hooge, Laurens, Miel Verkerken, Tim Wauters, Filip De Turck, and Bruno Volckaert. "Characterizing the Impact of Data-Damaged Models on Generalization Strength in Intrusion Detection." Journal of Cybersecurity and Privacy 3, no. 2 (2023): 118–44. http://dx.doi.org/10.3390/jcp3020008.
Full textNiu, Yingchun, Chengdong Chen, Xuehua Zhang, Xiaoguang Zhou, and Hongjie Liu. "Application of a New Feature Generation Algorithm in Intrusion Detection System." Wireless Communications and Mobile Computing 2022 (January 31, 2022): 1–17. http://dx.doi.org/10.1155/2022/3794579.
Full textFedorova, V. S., and V. V. Strigunov. "Solving One Problem of Network Traffic Anomaly Detection Using a Convolutional Neural Network." Вестник ТОГУ, no. 2(73) (June 24, 2024): 71–82. http://dx.doi.org/10.38161/1996-3440-2024-2-71-82.
Full textBook chapters on the topic "CSE-CIC-IDS2018"
Elhanashi, Abdussalam, Kaouther Gasmi, Andrea Begni, Pierpaolo Dini, Qinghe Zheng, and Sergio Saponara. "Machine Learning Techniques for Anomaly-Based Detection System on CSE-CIC-IDS2018 Dataset." In Lecture Notes in Electrical Engineering. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30333-3_17.
Full textCelik, Yuksel, Erdal Basaran, and Sanjay Goel. "Deep Learning Methods for Intrusion Detection Systems on the CSE-CIC-IDS2018 Dataset: A Review." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-89363-6_3.
Full textAlozie, Chisom Elizabeth. "Performance metrics analysis: Evaluating machine learning models in the detection of cloud-based DDoS." In Deep Science Publishing. Deep Science Publishing, 2025. https://doi.org/10.70593/978-93-49307-78-0_4.
Full textGasu, Daniel K., Winfred Yaokumah, and Justice Kwame Appati. "Supervised Machine Learning Methods for Cyber Threat Detection Using Genetic Algorithm." In Advances in Linguistics and Communication Studies. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-7702-1.ch002.
Full textAlozie, Chisom Elizabeth. "Feature selection and machine learning model optimization for DDoS detection." In Deep Science Publishing. Deep Science Publishing, 2025. https://doi.org/10.70593/978-93-49307-78-0_3.
Full textSharath, T., and A. Muthukumaravel. "Deep Learning-Powered Intrusion Detection Systems Networks Using LSTM." In Advances in Computer and Electrical Engineering. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-3739-4.ch006.
Full textConference papers on the topic "CSE-CIC-IDS2018"
Ibrahimi, Khalil, Mohammed Jouhari, and Zineb Jakout. "Enhancing Intrusion Detection Systems Using Machine Learning Classifiers on the CSE-CIC-IDS2018 Dataset." In 2024 11th International Conference on Wireless Networks and Mobile Communications (WINCOM). IEEE, 2024. http://dx.doi.org/10.1109/wincom62286.2024.10655131.
Full textYarram, Srimaan. "An Optimized Deep Learning Approach for Intrusion Detection: AE-DBN Hybrid Model with Dingo Feature Selection on CSE-CIC-IDS2018." In 2025 International Conference on Computing for Sustainability and Intelligent Future (COMP-SIF). IEEE, 2025. https://doi.org/10.1109/comp-sif65618.2025.10969957.
Full textSaidane, Samia, Francesco Telch, Kussai Shahin, and Fabrizio Granelli. "Optimizing Intrusion Detection System Performance through Synergistic Hyperparameter Tuning and Advanced Data Processing." In 11th International Conference on Computer Science, Engineering and Information Technology. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.141411.
Full textBorisenko, B. B., S. D. Erokhin, I. D. Martishin, and A. S. Fadeev. "How the CSE-CIC-IDS2018 Dataset is Related to the MITRE Matrix." In 2022 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO). IEEE, 2022. http://dx.doi.org/10.1109/synchroinfo55067.2022.9840920.
Full textKhan, Minhaj, and Mohd Haroon. "Artificial Neural Network-based Intrusion Detection in Cloud Computing using CSE-CIC-IDS2018 Datasets." In 2023 3rd Asian Conference on Innovation in Technology (ASIANCON). IEEE, 2023. http://dx.doi.org/10.1109/asiancon58793.2023.10269948.
Full textAyachi, Yassine, Youssef Mellah, Jamal Berrich, and Toumi Bouchentouf. "Increasing the Performance of an IDS using ANN model on the realistic cyber dataset CSE-CIC-IDS2018." In 2020 International Symposium on Advanced Electrical and Communication Technologies (ISAECT). IEEE, 2020. http://dx.doi.org/10.1109/isaect50560.2020.9523662.
Full textSmith, Morgan L., and Tor A. Kwembe. "Application of Machine Learning Classifiers Interfacing Google Colab and Sklearn to Intrusion Detection CSE-CIC-IDS2018 Dataset." In 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE). IEEE, 2023. http://dx.doi.org/10.1109/csce60160.2023.00311.
Full textKumar, Abhishek, and Dilkeshwar Pandey. "Enhancing intrusion detection with ML and deep learning: A survey of CICIDS 2017 and CSE-CIC-IDS2018 datasets." In 1ST INTERNATIONAL CONFERENCE ON RECENT ADVANCEMENTS IN COMPUTING TECHNOLOGIES & ENGINEERING. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0222131.
Full textNeira, Anderson Bergamini, Alex Medeiro, and Michele Nogueira. "Identificação Antecipada de Botnets por Aprendizagem de Máquina." In Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/sbrc.2020.12333.
Full textKanimozhi, V., and T. Prem Jacob. "Artificial Intelligence based Network Intrusion Detection with Hyper-Parameter Optimization Tuning on the Realistic Cyber Dataset CSE-CIC-IDS2018 using Cloud Computing." In 2019 International Conference on Communication and Signal Processing (ICCSP). IEEE, 2019. http://dx.doi.org/10.1109/iccsp.2019.8698029.
Full text