From: A survey and analysis of intrusion detection models based on CSE-CIC-IDS2018 Big Data
Authors | Computing environment |
---|---|
Atefinia and Ahmadi [14] | Python, Scikit-learn |
Basnet et al. [15] | fast.ai, GPU, Python |
Catillo et al. [16] | Keras, Python, Tensorflow |
Chadza et al. [17] | MATLAB 2019a, Snort IDS |
Chastikova and Sotnikov [18] | n/a |
D’hooge et al. [19] | Python, Scikit-learn, XGBoost |
Ferrag et al. [20] | Google Colab, GPU, Python,Tensorflow |
Filho et al. [21] | Python, Scikit-learn |
Gamage and Samarabandu [23] | GPU (on some PCs) |
Fitni and Ramli [22] | Python, Scikit-learn |
Hua [24] | Scikit-learn, Tensorflow |
Huancayo Ramos et al. [25] | Python, Scikit-learn |
Kanimozhi and Jacob [26] | Python, Scikit-learn |
Kanimozhi and Jacob [27] | Python, Scikit-learn |
Karatas et al. [28] | GPU, Keras, Python, Scikit-learn, Tensorflow |
Kim et al. [29] | Python, Tensorflow |
Li et al. [30] | Python |
Lin et al. [31] | Tensorflow |
Zhao et al. [32] | Python, Tensorflow |