Author:
Bellegdi Sameh,Selamat Ali,Olatunji Sunday O.,Fujita Hamido,Krejcar Ondfrej
Publisher
Springer Nature Singapore
Reference24 articles.
1. A realistic cyber defense dataset (CSE-CIC-IDS2018). https://registry.opendata.aws/cse-cic-ids2018/. Accessed 28 Nov 2023
2. Aslan, Ö., Aktuğ, S.S., Ozkan-Okay, M., Yilmaz, A.A., Akin, E.: A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics 12, 1333 (2023)
3. Breiman, L.: Random forests. Mach. Learn. 45, 5–32 (2001)
4. Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785–794 (2016)
5. CSE-CIC-IDS2018 on AWS. https://www.unb.ca/cic/datasets/ids-2018.html. Accessed 28 Nov 2023