Login / Signup

Intrusion detection via optimal tuned LSTM model with trust and risk level evaluation.

Ranjeet B. KagadeN. Vijayaraj
Published in: Int. J. Bio Inspired Comput. (2024)
Keyphrases
  • intrusion detection
  • network intrusion detection
  • trust model
  • network security
  • data mining
  • probabilistic model
  • anomaly detection
  • information retrieval
  • learning algorithm