Determine the optimal Hidden Layers and Neurons in the Generative Adversarial Networks topology for the Intrusion Detection Systems.
Ali LamjidKhairul Akram Zainol AriffinMohd Juzaiddin AB AzizNor Samsiah SaniPublished in: ICCR (2022)
Keyphrases
- hidden layer
- intrusion detection system
- computer networks
- intrusion detection
- network security
- back propagation
- activation function
- neural network
- feed forward
- learning rate
- anomaly detection
- artificial neural networks
- multilayer perceptron
- network traffic
- number of hidden units
- radial basis function
- recurrent neural networks
- feed forward neural networks
- feedforward neural networks
- network intrusion detection
- distributed intrusion detection
- number of hidden layers
- rbf neural network
- computer systems
- social networks
- intrusion prevention
- dynamic programming
- genetic algorithm
- neural nets
- generative model
- data mining techniques
- pattern recognition
- feature space
- alert correlation
- normal behavior
- output layer
- latent variables
- information security
- bp neural network