End-to-End Adversarial Learning for Intrusion Detection in Computer Networks.
Bahram MohammadiMohammad SabokrouPublished in: CoRR (2019)
Keyphrases
- end to end
- intrusion detection
- intrusion detection system
- computer networks
- network security
- network traffic
- network intrusion detection
- anomaly detection
- learning algorithm
- supervised learning
- cyber security
- reinforcement learning
- congestion control
- information retrieval
- data mining
- detecting anomalous
- network intrusion
- information security
- unsupervised learning
- active learning
- training data
- information systems
- machine learning