Author:
Salman Ola,Elhajj Imad H.,Kayssi Ayman,Chehab Ali
Publisher
Springer International Publishing
Reference51 articles.
1. dpkt. https://dpkt.readthedocs.io/en/latest/ . Accessed 2019
2. tensorflow. https://www.tensorflow.org/ . Accessed 2019
3. Alom, M.Z., Taha, T.M.: Network intrusion detection for cyber security using unsupervised deep learning approaches. In: 2017 IEEE National Aerospace and Electronics Conference (NAECON), pp. 63–69. IEEE (2017)
4. Baddar, S.A.H., Merlo, A., Migliardi, M.: Behavioral-anomaly detection in forensics analysis. IEEE Secur. Privacy 17(1), 55–62 (2019)
5. Beggel, L., Pfeiffer, M., Bischl, B.: Robust anomaly detection in images using adversarial autoencoders. arXiv preprint arXiv:1901.06355 (2019)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献