Login / Signup
A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection.
Mohanad Sarhan
Siamak Layeghy
Nour Moustafa
Marius Portmann
Published in:
CoRR (2021)
Keyphrases
</>
network intrusion detection
learning process
intrusion detection
data analysis
active learning
artificial immune
electronic commerce
anomaly detection
databases
knowledge discovery
reinforcement learning
decision trees
information systems
self organizing maps
fraud detection
learning algorithm
real world