{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T07:49:09Z","timestamp":1769154549428,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1145\/3723178.3723318","type":"proceedings-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:20:33Z","timestamp":1749194433000},"page":"1058-1065","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Network-Shield: Exploring the Efficacy of GRU Model in Intrusion Detection Using CIC-IDS 2018 Dataset"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-0691-0136","authenticated-orcid":false,"given":"Md. Ashik","family":"Elahi","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, Rajshahi University of Engineering &amp; Technology, Rajshahi, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0569-1393","authenticated-orcid":false,"given":"Rafi Ahammed","family":"Songram","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Rajshahi University of Engineering &amp; Technology, Rajshahi, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9690-4711","authenticated-orcid":false,"given":"Md Shahid","family":"Uz Zaman","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Rajshahi University of Engineering &amp; Technology, Rajshahi, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","unstructured":"Shaashwat Agrawal Sagnik Sarkar Ons Aouedi Gokul Yenduri Kandaraj Piamrat Mamoun Alazab Sweta Bhattacharya Praveen Kumar\u00a0Reddy Maddikunta and Thippa\u00a0Reddy Gadekallu. 2022. Federated Learning for intrusion detection system: Concepts challenges and future directions. Computer Communications 195 (2022) 346\u2013361. 10.1016\/j.comcom.2022.09.012","DOI":"10.1016\/j.comcom.2022.09.012"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","unstructured":"Zeeshan Ahmad Adnan Shahid\u00a0Khan Cheah Shiang and Farhan Ahmad. 2021. Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies 32 (01 2021). 10.1002\/ett.4150","DOI":"10.1002\/ett.4150"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","unstructured":"Ahmed Aleesa Bilal Bahaa A. Zaidan and Nan Sahar. 2020. Review of intrusion detection systems based on deep learning techniques: coherent taxonomy challenges motivations recommendations substantial analysis and future directions. Neural Computing and Applications 32 (07 2020). 10.1007\/s00521-019-04557-3","DOI":"10.1007\/s00521-019-04557-3"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/SISY.2017.8080566"},{"key":"e_1_3_3_1_6_2","unstructured":"Ram\u00a0B. Basnet Riad Shash Clayton Johnson Lucas Walgren and Tenzin Doleck. 2019. Towards Detecting and Classifying Network Intrusion Traffic Using Deep Learning Frameworks. J. Internet Serv. Inf. Secur. 9 (2019) 1\u201317. https:\/\/api.semanticscholar.org\/CorpusID:209406655"},{"key":"e_1_3_3_1_7_2","unstructured":"Arunavo Dey. 2020. Deep IDS: A deep learning approach for Intrusion detection based on IDS 2018. (2020) 1\u20135."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30333-3_17"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","unstructured":"Wisam Elmasry Akhan Akbulut and A. Zaim. 2019. Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Computer Networks 168 (12 2019) 107042. 10.1016\/j.comnet.2019.107042","DOI":"10.1016\/j.comnet.2019.107042"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","unstructured":"Rawaa Farhan Abeer Maolood and Nidaa Flaih. 2022. Optimized Deep Learning with Binary PSO for Intrusion Detection on CSE-CIC-IDS2018 Dataset. Journal of Al-Qadisiyah for Computer Science and Mathematics 12 (08 2022) 16\u201327. 10.29304\/jqcm.2020.12.3.706","DOI":"10.29304\/jqcm.2020.12.3.706"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","unstructured":"Rawaa Farhan Abeer Maolood and Nidaa Hassan. 2020. Performance analysis of flow-based attacks detection on CSE-CIC-IDS2018 dataset using deep learning Deep learning Flow-based intrusion detection Internet of thing (IOT). Indonesian Journal of Electrical Engineering and Computer Science 20 (12 2020) 1413\u20131418. 10.11591\/ijeecs.v20.i3.pp1413-1418","DOI":"10.11591\/ijeecs.v20.i3.pp1413-1418"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","unstructured":"V. Kanimozhi and Prem Jacob. 2019. CALIBRATION OF VARIOUS OPTIMIZED MACHINE LEARNING CLASSIFIERS IN NETWORK INTRUSION DETECTION SYSTEM ON THE REALISTIC CYBER DATASET CSE-CIC-IDS2018 USING CLOUD COMPUTING. International Journal of Engineering Applied Sciences and Technology 04 (12 2019) 209\u2013213. 10.33564\/IJEAST.2019.v04i06.036","DOI":"10.33564\/IJEAST.2019.v04i06.036"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","unstructured":"Jiyeon Kim Yulim Shin and Eunjung Choi. 2019. An Intrusion Detection Model based on a Convolutional Neural Network. Journal of Multimedia Information System 6 (12 2019) 165\u2013172. 10.33851\/JMIS.2019.6.4.165","DOI":"10.33851\/JMIS.2019.6.4.165"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23502-4_12"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/CNS56114.2022.9947235"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Iman Sharafaldin Amirhossein Gharib Arash\u00a0Habibi Lashkari and Ali\u00a0A Ghorbani. 2018. Towards a reliable intrusion detection benchmark dataset. Software Networking 2018 1 (2018) 177\u2013200.","DOI":"10.13052\/jsn2445-9739.2017.009"},{"key":"e_1_3_3_1_18_2","unstructured":"Samuel\u00a0Henrique Silva and Peyman Najafirad. 2020. Opportunities and Challenges in Deep Learning Adversarial Robustness: A Survey. arxiv:cs.LG\/2007.00753"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Ravi Vinayakumar Mamoun Alazab K\u00a0Padannayil Soman Prabaharan Poornachandran Ameer Al-Nemrat and Sitalakshmi Venkatraman. 2019. Deep learning approach for intelligent intrusion detection system. Ieee Access 7 (2019) 41525\u201341550.","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"e_1_3_3_1_21_2","unstructured":"Qianru Zhou and Dimitrios\u00a0P. Pezaros. 2019. Evaluation of Machine Learning Classifiers for Zero-Day Intrusion Detection - An Analysis on CIC-AWS-2018 dataset. ArXiv abs\/1905.03685 (2019). https:\/\/api.semanticscholar.org\/CorpusID:148574201"}],"event":{"name":"ICCA 2024: 3rd International Conference on Computing Advancements","location":"Dhaka Bangladesh","acronym":"ICCA 2024"},"container-title":["Proceedings of the 3rd International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723318","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723178.3723318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:48Z","timestamp":1750298208000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723318"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":20,"alternative-id":["10.1145\/3723178.3723318","10.1145\/3723178"],"URL":"https:\/\/doi.org\/10.1145\/3723178.3723318","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"2025-06-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}