Attack types and descriptions in CICIDS datasets.

<div><p>Deep learning methods have achieved remarkable progress in network intrusion detection. However, their performance often deteriorates significantly in real-world scenarios characterized by limited attack samples and substantial domain shifts. To address this challenge, we propose...

Full description

Saved in:
Bibliographic Details
Main Author: Congyuan Xu (3338283) (author)
Other Authors: Donghui Li (94039) (author), Zihao Liu (4020458) (author), Jun Yang (2084) (author), Qinfeng Shen (21647973) (author), Ningbing Tong (21647976) (author)
Published: 2025
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!