Login / Signup
Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?
Andrea Corsini
Shanchieh Jay Yang
Published in:
CoRR (2023)
Keyphrases
</>
network intrusion detection
intrusion detection
anomaly detection
network intrusion
fraud detection
artificial immune
intrusion detection system
network traffic data
network traffic
network attacks
network anomaly detection
database
data mining
feature selection
support vector
electronic commerce