Search alternatives:
detection optimization » reaction optimization (Expand Search), generation optimization (Expand Search), distortion optimization (Expand Search)
share optimization » swarm optimization (Expand Search), whale optimization (Expand Search), phase optimization (Expand Search)
case detection » cancer detection (Expand Search)
binary case » binary mask (Expand Search), binary image (Expand Search), primary case (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
data share » data store (Expand Search), data space (Expand Search), data sharing (Expand Search)
detection optimization » reaction optimization (Expand Search), generation optimization (Expand Search), distortion optimization (Expand Search)
share optimization » swarm optimization (Expand Search), whale optimization (Expand Search), phase optimization (Expand Search)
case detection » cancer detection (Expand Search)
binary case » binary mask (Expand Search), binary image (Expand Search), primary case (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
data share » data store (Expand Search), data space (Expand Search), data sharing (Expand Search)
-
1
MSE for ILSTM algorithm in binary classification.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
Comparison of intrusion detection systems.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
-
17
Summary of LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
-
18
SHAP analysis for LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
-
19
Parameter setting for CBOA and PSO.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”
-
20
NSL-KDD dataset description.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. …”