A multi-constraint transfer approach with additional auxiliary domains for IoT intrusion detection under unbalanced samples distribution.
Ruiqi LiuWengang MaJin GuoPublished in: Appl. Intell. (2024)
Keyphrases
- intrusion detection
- intrusion detection system
- anomaly detection
- network security
- network traffic
- network intrusion detection
- high detection rate
- transfer learning
- data mining
- network intrusion
- artificial immune
- computer security
- information security
- detecting anomalous
- data sets
- network intrusions
- cyber security
- false positives and false negatives
- data mining techniques
- alert correlation
- network attacks
- information retrieval
- real world
- cloud computing
- data processing
- cyber attacks
- maximum likelihood
- database systems
- databases