Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach.
Qingtian ZouAnoop SinghalXiaoyan SunPeng LiuPublished in: J. Comput. Secur. (2022)
Keyphrases
- end to end
- deep learning
- network attacks
- intrusion detection
- network intrusion detection
- unsupervised learning
- machine learning
- network security
- ad hoc networks
- unsupervised feature learning
- intrusion detection system
- congestion control
- multipath
- mental models
- dos attacks
- feature extraction
- data mining
- real world
- data processing
- object recognition