2020
DOI: 10.1007/978-3-030-57024-8_5
|View full text |Cite
|
Sign up to set email alerts
|

Improving Cyber-Threat Detection by Moving the Boundary Around the Normal Samples

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 67 publications
0
3
0
Order By: Relevance
“…The authors used the AE to extract attack features. The CNN and MLP are applied to detect the intrusion attack [28][29][30] .…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The authors used the AE to extract attack features. The CNN and MLP are applied to detect the intrusion attack [28][29][30] .…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, five algorithms were used, that is, THEODORA [28] , AIDA [29] , MINDFUL [30] and, DNN-3 [35] and DNN4Layers [36] , as the comparative algorithms to verify the efficiency of the cVAE-DML. The details of those comparative algorithms are shown as follows.…”
Section: Comparative Experimentsmentioning
confidence: 99%
See 1 more Smart Citation