Bagui et al., 2019
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Bagui et al. | Using machine learning techniques to identify rare cyber‐attacks on the UNSW‐NB15 dataset | |
| Hindy et al. | A taxonomy and survey of intrusion detection system design techniques, network threats and datasets | |
| Bijone | A survey on secure network: intrusion detection & prevention approaches | |
| Moustafa | Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic | |
| Kumar et al. | Intrusion detection systems: a review | |
| Mukkamala et al. | Cyber security challenges: Designing efficient intrusion detection systems and antivirus tools | |
| Thomas | Improving intrusion detection for imbalanced network traffic | |
| Sakthivelu et al. | Advanced Persistent Threat Detection and Mitigation Using Machine Learning Model. | |
| Patgiri et al. | Preventing ddos using bloom filter: A survey | |
| Wang | Big data in intrusion detection systems and intrusion prevention systems | |
| Ozkan-Okay et al. | SABADT: hybrid intrusion detection approach for cyber attacks identification in WLAN | |
| Hussein | Performance analysis of different machine learning models for intrusion detection systems | |
| Sree et al. | HADM: detection of HTTP GET flooding attacks by using Analytical hierarchical process and Dempster–Shafer theory with MapReduce | |
| Kumar et al. | Detecting intrusions and attacks in the network traffic using anomaly based techniques | |
| Le et al. | Unsupervised monitoring of network and service behaviour using self organizing maps | |
| Shushlevska et al. | Anomaly detection with various machine learning classification techniques over UNSW-NB15 dataset | |
| Lah et al. | Proposed framework for network lateral movement detection based on user risk scoring in siem | |
| Jing et al. | DDoS detection based on graph structure features and non‐negative matrix factorization | |
| Catak | Two-layer malicious network flow detection system with sparse linear model based feature selection | |
| Sukhni et al. | A systematic analysis for botnet detection using genetic algorithm | |
| Zhang et al. | Deep graph embedding for IoT botnet traffic detection | |
| Yong et al. | Understanding botnet: From mathematical modelling to integrated detection and mitigation framework | |
| Ramos et al. | A Machine Learning Based Approach to Detect Stealthy Cobalt Strike C &C Activities from Encrypted Network Traffic | |
| Kumar et al. | Employing Supervised Learning Techniques for DDoS Attack Detection | |
| Kil et al. | Multi-Binary Classifiers Using Optimal Feature Selection for Memory-Saving Intrusion Detection Systems. |