Статті в журналах з теми "CIC-DDoS2019 dataset"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-47 статей у журналах для дослідження на тему "CIC-DDoS2019 dataset".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Deris Stiawan, Deris Stiawan, Dimas Wahyudi Deris Stiawan, Tri Wanda Septian Dimas Wahyudi, Mohd Yazid Idris Tri Wanda Septian, and Rahmat Budiarto Mohd Yazid Idris. "The Development of an Internet of Things (IoT) Network Traffic Dataset with Simulated Attack Data." 網際網路技術學刊 24, no. 2 (2023): 345–56. http://dx.doi.org/10.53106/160792642023032402013.
Повний текст джерелаZaki, Rana M., and Inam S. Naser. "Hybrid Classifier for Detecting Zero-Day Attacks on IoT Networks." Mesopotamian Journal of CyberSecurity 4, no. 3 (2024): 59–74. http://dx.doi.org/10.58496/mjcs/2024/016.
Повний текст джерелаMa, Ruikui, Xuebin Chen, and Ran Zhai. "A DDoS Attack Detection Method Based on Natural Selection of Features and Models." Electronics 12, no. 4 (2023): 1059. http://dx.doi.org/10.3390/electronics12041059.
Повний текст джерелаAhmad, Iftikhar, Muhammad Imran, Abdul Qayyum, Muhammad Sher Ramzan, and Madini O. Alassafi. "An Optimized Hybrid Deep Intrusion Detection Model (HD-IDM) for Enhancing Network Security." Mathematics 11, no. 21 (2023): 4501. http://dx.doi.org/10.3390/math11214501.
Повний текст джерелаD’hooge, Laurens, Miel Verkerken, Tim Wauters, Filip De Turck, and Bruno Volckaert. "Investigating Generalized Performance of Data-Constrained Supervised Machine Learning Models on Novel, Related Samples in Intrusion Detection." Sensors 23, no. 4 (2023): 1846. http://dx.doi.org/10.3390/s23041846.
Повний текст джерелаFerrag, Mohamed Amine, Lei Shu, Hamouda Djallel, and Kim-Kwang Raymond Choo. "Deep Learning-Based Intrusion Detection for Distributed Denial of Service Attack in Agriculture 4.0." Electronics 10, no. 11 (2021): 1257. http://dx.doi.org/10.3390/electronics10111257.
Повний текст джерелаXu, Hao, and Hequn Xian. "SCD: A Detection System for DDoS Attacks based on SAE-CNN Networks." Frontiers in Computing and Intelligent Systems 5, no. 3 (2023): 94–99. http://dx.doi.org/10.54097/fcis.v5i3.13865.
Повний текст джерелаWilliams, Brandon, and Lijun Qian. "Semi-Supervised Learning for Intrusion Detection in Large Computer Networks." Applied Sciences 15, no. 11 (2025): 5930. https://doi.org/10.3390/app15115930.
Повний текст джерелаYzzogh, Hicham, and Hafssa Benaboud. "Enhancing SDN security with a feature-based approach using multiple k-means, Word2Vec, and neural network." Bulletin of Electrical Engineering and Informatics 14, no. 2 (2025): 1456–67. https://doi.org/10.11591/eei.v14i2.8834.
Повний текст джерелаZ, Syauqii Fayyadh Hilal, and Rushendra Rushendra. "The Efficiency of Machine Learning Techniques in Strengthening Defenses Against DDoS Attacks, Such as Random Forest, Logistic Regression, and Neural Networks." sinkron 9, no. 1 (2025): 520–30. https://doi.org/10.33395/sinkron.v9i1.14502.
Повний текст джерелаZegarra Rodríguez, Demóstenes, Ogobuchi Daniel Okey, Siti Sarah Maidin, Ekikere Umoren Udo, and João Henrique Kleinschmidt. "Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection." PLOS ONE 18, no. 10 (2023): e0286652. http://dx.doi.org/10.1371/journal.pone.0286652.
Повний текст джерелаAldhyani, Theyazn H. H., and Hasan Alkahtani. "Cyber Security for Detecting Distributed Denial of Service Attacks in Agriculture 4.0: Deep Learning Model." Mathematics 11, no. 1 (2023): 233. http://dx.doi.org/10.3390/math11010233.
Повний текст джерелаAhmed, Ahmed, Noor D. AL AL-Shakarchy, and Mais Saad Safoq. "Early DDoS Attack Detection Using Lightweight Deep Neural Network." Fusion: Practice and Applications 19, no. 2 (2025): 392–401. https://doi.org/10.54216/fpa.190228.
Повний текст джерелаKanber, Bassam M., Naglaa F. Noaman, Amr M. H. Saeed, and Mansoor Malas. "DDoS Attacks Detection in the Application Layer Using Three Level Machine Learning Classification Architecture." International Journal of Computer Network and Information Security 14, no. 3 (2022): 33–46. http://dx.doi.org/10.5815/ijcnis.2022.03.03.
Повний текст джерелаSoim, Sopian, Sholihin Sholihin, and Cahyo Bayu Subianto. "Optimizing Performance Random Forest Algorithm Using Correlation-Based Feature Selection (CFS) Method to Improve Distributed Denial of Service (DDoS) Attack Detection Accuracy." Indonesian Journal of Artificial Intelligence and Data Mining 7, no. 2 (2024): 220. http://dx.doi.org/10.24014/ijaidm.v7i2.24783.
Повний текст джерелаChartuni, Andrés, and José Márquez. "Multi-Classifier of DDoS Attacks in Computer Networks Built on Neural Networks." Applied Sciences 11, no. 22 (2021): 10609. http://dx.doi.org/10.3390/app112210609.
Повний текст джерелаBabić, Ivan, Aleksandar Miljković, Milan Čabarkapa, et al. "Triple Modular Redundancy Optimization for Threshold Determination in Intrusion Detection Systems." Symmetry 13, no. 4 (2021): 557. http://dx.doi.org/10.3390/sym13040557.
Повний текст джерелаYuliswar, Teddy, Ikhwana Elfitri, and Onno W purbo. "Optimization of Intrusion Detection System with Machine Learning for Detecting Distributed Attacks on Server." INOVTEK Polbeng - Seri Informatika 10, no. 1 (2025): 367–76. https://doi.org/10.35314/vem9da98.
Повний текст джерелаMa, Ruikui, Qiuqian Wang, Xiangxi Bu, and Xuebin Chen. "Real-Time Detection of DDoS Attacks Based on Random Forest in SDN." Applied Sciences 13, no. 13 (2023): 7872. http://dx.doi.org/10.3390/app13137872.
Повний текст джерелаDasari, Kishore Babu, and Nagaraju Devarakonda. "Detection of TCP-Based DDoS Attacks with SVM Classification with Different Kernel Functions Using Common Uncorrelated Feature Subsets." International Journal of Safety and Security Engineering 12, no. 2 (2022): 239–49. http://dx.doi.org/10.18280/ijsse.120213.
Повний текст джерелаAli, Basheer Husham, Nasri Sulaiman, Syed Abdul Rahman Al-Haddad, Rodziah Atan, Siti Lailatul Mohd Hassan, and Mokhalad Alghrairi. "Identification of Distributed Denial of Services Anomalies by Using Combination of Entropy and Sequential Probabilities Ratio Test Methods." Sensors 21, no. 19 (2021): 6453. http://dx.doi.org/10.3390/s21196453.
Повний текст джерелаZhu, Yuanjiao, Yanling Chen, Jingsong Li, et al. "The DDoS Attack Detection for Information Systems of High-Penetration Renewable Energy Grids Based on TCN-BiLSTM." Journal of Physics: Conference Series 3022, no. 1 (2025): 012006. https://doi.org/10.1088/1742-6596/3022/1/012006.
Повний текст джерелаNavya, Vattikonda Anuj Kumar Gupta Achuthananda Reddy Polu Bhumeka Narra Dheeraj Varun Kumar Reddy Buddula and Hari Hara Sudheer Patchipulusu. "Machine Learning-Based Approaches for Detecting and Mitigating Distributed Denial of Service (DDoS) Attacks to Improved Cloud Security." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN MULTIDISCIPLINARY EDUCATION 3, no. 12 (2024): 1993–64. https://doi.org/10.5281/zenodo.15340752.
Повний текст джерелаKaliyaperumal, Karthikeyan, Raja Sarath Kumar Boddu, Sai Kiran Oruganti, Guidsa Tesema Kebesa, Mohsen Aghaeiboorkheili, and Rajendran Bhojan. "An Efficient Technique for Identifying Distributed Denial ofService Active Assaults Using Deep Neural Networks Based on the Adaptive System Intelligence Paradigm." International Journal of Basic and Applied Sciences 14, no. 2 (2025): 577–90. https://doi.org/10.14419/dwfxsc41.
Повний текст джерелаPeng, Silin, Yu Han, Ruonan Li, Lichen Liu, Jie Liu, and Zhaoquan Gu. "ROSE-BOX: A Lightweight and Efficient Intrusion Detection Framework for Resource-Constrained IIoT Environments." Applied Sciences 15, no. 12 (2025): 6448. https://doi.org/10.3390/app15126448.
Повний текст джерелаFang, Menghao, Yixiang Wang, Liangbin Yang, et al. "Reinventing Web Security: An Enhanced Cycle-Consistent Generative Adversarial Network Approach to Intrusion Detection." Electronics 13, no. 9 (2024): 1711. http://dx.doi.org/10.3390/electronics13091711.
Повний текст джерелаAnukriti Naithani, Shailendra Narayan Singh. "Quantum-Enhanced Ddos Detection in 5G Cloud Networks using Bottleneck Attention Mechanism." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 1409–26. https://doi.org/10.52783/cana.v32.4166.
Повний текст джерелаBerríos, Sebastián, Sebastián Garcia, Pamela Hermosilla, and Héctor Allende-Cid. "A Machine-Learning-Based Approach for the Detection and Mitigation of Distributed Denial-of-Service Attacks in Internet of Things Environments." Applied Sciences 15, no. 11 (2025): 6012. https://doi.org/10.3390/app15116012.
Повний текст джерелаAlshdadi, Abdulrahman A., Abdulwahab Ali Almazroi, Nasir Ayub, et al. "Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks." Future Internet 17, no. 2 (2025): 88. https://doi.org/10.3390/fi17020088.
Повний текст джерелаXu, Wen, Julian Jang-Jaccard, Tong Liu, Fariza Sabrina, and Jin Kwak. "Improved Bidirectional GAN-Based Approach for Network Intrusion Detection Using One-Class Classifier." Computers 11, no. 6 (2022): 85. http://dx.doi.org/10.3390/computers11060085.
Повний текст джерелаMills, Godfrey A., Daniel K. Acquah, and Robert A. Sowah. "Network Intrusion Detection and Prevention System Using Hybrid Machine Learning with Supervised Ensemble Stacking Model." Journal of Computer Networks and Communications 2024, no. 1 (2024). http://dx.doi.org/10.1155/2024/5775671.
Повний текст джерелаİnce, Uğur, and Gülşah Karaduman. "Classification of Distributed Denial of Service Attacks Using Machine Learning Methods." NATURENGS MTU Journal of Engineering and Natural Sciences Malatya Turgut Ozal University, May 1, 2024. http://dx.doi.org/10.46572/naturengs.1450965.
Повний текст джерела"COMPARATIVE ANALYSIS OF MACHINE LEARNING METHODS FOR NETWORK TRAFFIC BINARY CLASSIFICATION." Infokommunikacionnye tehnologii, March 28, 2025, 20–26. https://doi.org/10.18469/ikt.2024.22.2.03.
Повний текст джерелаWang, Bangli, Yuxuan Jiang, You Liao, and Zhen Li. "DDoS‐MSCT: A DDoS Attack Detection Method Based on Multiscale Convolution and Transformer." IET Information Security 2024, no. 1 (2024). http://dx.doi.org/10.1049/2024/1056705.
Повний текст джерелаHicham, Yzzogh, and Benaboud Hafssa. "Enhancing SDN security with a feature-based approach using multiple k-means, Word2Vec, and neural network." March 5, 2025. https://doi.org/10.11591/eei.v14i2.8834.
Повний текст джерелаAlslman, Yasmeen, Ashwaq Khalil, Remah Younisse, Eman AlNagi, Jaafer Saraireh, and Rawan Ghnemat. "DDoS Attacks Detection Approach based on Ensemble Model using Spark." Jordanian Journal of Computers and Information Technology, 2024, 1. http://dx.doi.org/10.5455/jjcit.71-1694806966.
Повний текст джерелаRoopak, Monika, Simon Parkinson, Gui Yun Tian, Yachao Ran, Saad Khan, and Balasubramaniyan Chandrasekaran. "An unsupervised approach for the detection of zero‐day distributed denial of service attacks in Internet of Things networks." IET Networks, October 8, 2024. http://dx.doi.org/10.1049/ntw2.12134.
Повний текст джерелаFerdous, Farhan Sadik, Tapu Biswas, and Akinul Islam Jony. "Enhancing Cybersecurity: Machine Learning Approaches for Predicting DDoS Attack." Malaysian Journal of Science and Advanced Technology, July 4, 2024, 249–55. http://dx.doi.org/10.56532/mjsat.v4i3.306.
Повний текст джерелаHossain, Md Alamgir. "Enhanced Ensemble-Based Distributed Denial-of-Service (DDoS) Attack Detection with Novel Feature Selection: A Robust Cybersecurity Approach." Artificial Intelligence Evolution, August 24, 2023, 165–86. http://dx.doi.org/10.37256/aie.4220233337.
Повний текст джерелаGuzman-Brand, Victor Alfonso, and Laura Gelvez-Garcia. "Identificación de ataques de denegación de servicio distribuido (DDoS) mediante la integración de algoritmos de aprendizaje automático y arquitecturas de redes neuronales artificiales." Revista Ingeniería, Matemáticas y Ciencias de la Información 12, no. 23 (2025). https://doi.org/10.21017/rimci.1116.
Повний текст джерелаRashid Najam, Nora, and Razan Abdulhammed Abduljawad. "RF-RFE-SMOTE: A DoS And DDoS Attack Detection Framework." NTU Journal of Engineering and Technology 2, no. 2 (2023). http://dx.doi.org/10.56286/ntujet.v2i2.436.
Повний текст джерелаPrasad, Arvind, and Shalini Chandra. "Machine learning to combat cyberattack: a survey of datasets and challenges." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, May 1, 2022, 154851292210948. http://dx.doi.org/10.1177/15485129221094881.
Повний текст джерелаLalduhsaka, R., and Ajoy Kumar Khan. "Enhanced Intrusion Detection System Using a Two‐Staged Feature Selection Method." SECURITY AND PRIVACY 8, no. 3 (2025). https://doi.org/10.1002/spy2.70025.
Повний текст джерелаLi, Guo, and MingHua Wang. "A Meta-learning Approach for Few-shot Network Intrusion Detection Using Depthwise Separable Convolution." Journal of ICT Standardization, March 10, 2025, 443–70. https://doi.org/10.13052/jicts2245-800x.1245.
Повний текст джерелаMahdi, Zaed S., Rana M. Zaki, and Laith Alzubaidi. "Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks." SECURITY AND PRIVACY, October 2024. http://dx.doi.org/10.1002/spy2.471.
Повний текст джерелаAyad, Aya G., Nehal A. Sakr, and Noha A. Hikal. "A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks." Journal of Supercomputing, August 29, 2024. http://dx.doi.org/10.1007/s11227-024-06409-x.
Повний текст джерелаPrasath, J. S., V. Irine Shyja, P. Chandrakanth, Boddepalli Kiran Kumar, and Adam Raja Basha. "An optimal secure defense mechanism for DDoS attack in IoT network using feature optimization and intrusion detection system." Journal of Intelligent & Fuzzy Systems, January 19, 2024, 1–18. http://dx.doi.org/10.3233/jifs-235529.
Повний текст джерела