Towards Application of the Tabular Data Transformation to Images in the Intrusion Detection Tasks Using Deep Learning Techniques.
Evgenia NovikovaMarat BukhtiarovIgor V. KotenkoElena FedorchenkoIgor SaenkoPublished in: IDC (2023)
Keyphrases
- intrusion detection
- deep learning
- data transformation
- intrusion detection system
- anomaly detection
- input image
- image classification
- image features
- object recognition
- unsupervised learning
- segmentation method
- data mining
- data integration
- similarity measure
- information security
- data sets
- decision support system
- information systems
- privacy preservation
- information retrieval