1. Enriching Word Vectors with Subword Information
2. Liyan Chang and Paula Branco . 2021. Graph-based Solutions with Residuals for Intrusion Detection: the Modified E-GraphSAGE and E-ResGAT Algorithms. arXiv preprint arXiv:2111.13597 ( 2021 ). Liyan Chang and Paula Branco. 2021. Graph-based Solutions with Residuals for Intrusion Detection: the Modified E-GraphSAGE and E-ResGAT Algorithms. arXiv preprint arXiv:2111.13597 (2021).
3. Saikat Das , Mohammad Ashrafuzzaman , Frederick T Sheldon , and Sajjan Shiva . 2020 . Network Intrusion Detection using Natural Language Processing and Ensemble Machine Learning . In 2020 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE, 829--835 . Saikat Das, Mohammad Ashrafuzzaman, Frederick T Sheldon, and Sajjan Shiva. 2020. Network Intrusion Detection using Natural Language Processing and Ensemble Machine Learning. In 2020 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE, 829--835.
4. Jacob Devlin , Ming-Wei Chang , Kenton Lee , and Kristina Toutanova . 2018 . Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018). Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018).
5. Abhishek Divekar , Meet Parekh , Vaibhav Savla , Rudra Mishra , and Mahesh Shirole . 2018. Benchmarking datasets for anomaly-based network intrusion detection: KDD CUP 99 alternatives. In 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS) . IEEE , 1--8. Abhishek Divekar, Meet Parekh, Vaibhav Savla, Rudra Mishra, and Mahesh Shirole. 2018. Benchmarking datasets for anomaly-based network intrusion detection: KDD CUP 99 alternatives. In 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS). IEEE, 1--8.