Author:
G. Lira Oscar,Marroquin Alberto,To Marco Antonio
Publisher
Springer Nature Switzerland
Reference29 articles.
1. Vaswani, A., et al.: Attention is all you need, arXiv preprint, arXiv:1706.03762, https://arxiv.org/abs/1706.03762 (2023)
2. Ferrag, M.A., Ndhlovu, M., Tihanyi, N., Cordeiro, L.C., Debbah, M., Lestable, T.: Revolutionizing cyber threat detection with large language models, arXiv preprint, arXiv:2306.14263, https://arxiv.org/abs/2306.14263 (2023)
3. Li, F., Shen, H., Mai, J., et al.: Pre-trained language model-enhanced conditional generative adversarial networks for intrusion detection. Peer-to-Peer Netw. Appl. (2023). https://doi.org/10.1007/s12083-023-01595-6
4. Saurabh, K.: LBDMIDS: LSTM based deep learning model for intrusion detection systems for IoT networks. IEEE World AI IoT Congress (AIIoT). 2022, 753–75 (2022). https://doi.org/10.1109/AIIoT54504.2022.9817245
5. Huang, X., Zhang, Y.: Network intrusion detection based on an improved long-short-term memory model in combination with multiple patiotemporal structures. Wirel. Commun. Mobile Comput. 2021, 6623554 (2022).https://doi.org/10.1155/2021/6623554