Search alternatives:
complement based » complement past (Expand Search), complement cascade (Expand Search), complement system (Expand Search)
coding algorithm » cosine algorithm (Expand Search), modeling algorithm (Expand Search), finding algorithm (Expand Search)
multi algorithm » multiple algorithms (Expand Search), custom algorithm (Expand Search)
second multi » second molar (Expand Search), second most (Expand Search)
complement based » complement past (Expand Search), complement cascade (Expand Search), complement system (Expand Search)
coding algorithm » cosine algorithm (Expand Search), modeling algorithm (Expand Search), finding algorithm (Expand Search)
multi algorithm » multiple algorithms (Expand Search), custom algorithm (Expand Search)
second multi » second molar (Expand Search), second most (Expand Search)
-
1
-
2
-
3
-
4
GA pseudo-code.
Published 2025“…Genetic algorithm is utilized to solve and optimize the data, one-dimensional multi-scale convolutional neural network is combined with gated recurrent unit to improve the network intrusion detection model, and finally the detection and defense of industrial control network intrusion is completed. …”
-
5
-
6
Pseudo-code for the study design model.
Published 2025“…Genetic algorithm is utilized to solve and optimize the data, one-dimensional multi-scale convolutional neural network is combined with gated recurrent unit to improve the network intrusion detection model, and finally the detection and defense of industrial control network intrusion is completed. …”
-
7
-
8
-
9
-
10
-
11
-
12
-
13
(a) Prediction using traditional algorithm. (b) Prediction using optimization algorithm.
Published 2025Subjects: -
14
-
15
-
16
-
17
-
18
-
19
-
20