Abstract: Network-based intrusion detection is a widely explored topic in the literature. Yet, despite the promising reported results, designed schemes are rarely used in production environments.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results