On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection.
Yixiang WangShaoHua LvJiqiang LiuXiaolin ChangJinqiang WangPublished in: Cybersecur. (2020)
Keyphrases
- intrusion detection
- probabilistic model
- data sets
- anomaly detection
- normal behavior
- database
- network security
- detection method
- data mining techniques
- data sources
- data analysis
- training data
- intrusion detection system
- multiple models
- data points
- data processing
- computer systems
- high dimensional
- false positives
- information retrieval
- real world