Choudhary and N. Kesswani, “Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 datasets using deep learning in IoT”. Procedia Computer Science, 2020. 167: p. 1561-1573.
Javaid, et al., “A deep learning approach for network intrusion detection system”. Eai Endorsed Transactions on Security and Safety, 2016. 3(9): p. e2.
Faker, and E. Dogdu, “Intrusion detection using big data and deep learning techniques”, Proceedings of the 2019 ACM Southeast Conference. 2019.
B. Bhavsar, and K.C. Waghmare, “Intrusion detection system using data mining technique: Support vector machine”, International Journal of Emerging Technology and Advanced Engineering, 2013. 3(3): p. 581-586.
Mirjalili, “Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems”,Neural Computing and Applications, 2016. 27(4): p. 1053-1073.
Hindy, et al., “A taxonomy and survey of intrusion detection system design techniques”, network threats and datasets. 2018.
Yahalom, et al., “Improving the effectiveness of intrusion detection systems for hierarchical data”. Knowledge-Based Systems, 2019. 168: p. 59-69.
Bedi, N. Gupta, and V. Jindal, “Siam-IDS: Handling class imbalance problem in intrusion detection systems using siamese neural network”. Procedia Computer Science, 2020. 171: p. 780-789.
Dhanabal, and S. Shantharajah, “A study on NSL-KDD dataset for intrusion detection system based on classification algorithms”. International journal of advanced research in computer and communication engineering, 2015. 4(6): p. 446-452.
A. Tait, , et al., “Intrusion Detection using Machine Learning Techniques: An Experimental Comparison”. arXiv preprint arXiv:2105.13435, 2021.
Vinayakumar, et al., “Deep learning approach for intelligent intrusion detection system”. IEEE Access, 2019. 7: p. 41525-41550.
L.G. Rios, et al. “Detection of denial of service attacks in communication networks”. in 2020 IEEE International Symposium on Circuits and Systems (ISCAS). 2020. IEEE.
Ahmim, et al. “A novel hierarchical intrusion detection system based on decision tree and rules-based models”. in 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS). 2019. IEEE.
A.H. Ghanem, et al., “An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons”. IEEE Access, 2020. 8: p. 130452-130475.
Toupas, et al. “An intrusion detection system for multi-class classification based on deep neural networks”. in 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA). 2019. IEEE.
Boukhamla ,and J.C. Gaviro, “CICIDS2017 dataset: performance improvements and validation as a robust intrusion detection system testbed”. International Journal of Information and Computer Security, 2021. 16(1-2): p. 20-32.
Panigrahi, and S. Borah, “A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems”. International Journal of Engineering & Technology, 2018. 7(3.24): p. 479-482.
Panwar, Y. Raiwani, and L.S. Panwar. “Evaluation of network intrusion detection with features selection and machine learning algorithms on CICIDS-2017 dataset”. in International Conference on Advances in Engineering Science Management & Technology (ICAESMT)-2019, Uttaranchal University, Dehradun, India. 2019.
M. Mafarja, et al. “Binary dragonfly algorithm for feature selection”. in 2017 International conference on new trends in computing sciences (ICTCS). 2017. IEEE.
Bhavani, M.K. Rao, and A.M. Reddy. “Network intrusion detection system using random forest and decision tree machine learning techniques”. in First international conference on sustainable technologies for computational intelligence. 2020. Springer.
Pal, “Random forest classifier for remote sensing classification”. International journal of remote sensing, 2005. 26(1): p. 217-222.
Nkenyereye, B.A. Tama, and S. Lim, “A stacking-based deep neural network approach for effective network anomaly detection”. CMC-Computers Materials & Continua, 2021. 66(2): p. 2217-2227.
Kurochkin, and S. Volkov. “Using GRU based deep neural network for intrusion detection in software-defined networks”. in IOP Conference Series: Materials Science and Engineering. 2020. IOP Publishing.
Marir, et al., “Distributed abnormal behavior detection approach based on deep belief network and ensemble SVM using spark”. IEEE Access, 2018. 6: p. 59657-59671.