Login / Signup

Towards Application of the Tabular Data Transformation to Images in the Intrusion Detection Tasks Using Deep Learning Techniques.

Evgenia NovikovaMarat BukhtiarovIgor V. KotenkoElena FedorchenkoIgor Saenko
Published in: IDC (2023)
Keyphrases