Cited By
View all- Dash NChakravarty SRath AGiri NAboRas KGowtham N(2025)An optimized LSTM-based deep learning model for anomaly network intrusion detectionScientific Reports10.1038/s41598-025-85248-z15:1Online publication date: 10-Jan-2025
- S. LDharan S(2024)A Comparative Analysis of Convolutional, Sequential and Their Hybrid Models in Detecting Cyber-Attacks2024 1st International Conference on Trends in Engineering Systems and Technologies (ICTEST)10.1109/ICTEST60614.2024.10576092(01-08)Online publication date: 11-Apr-2024
- Saeed NIbrahim AAli LAl-Dmour NMohammed AGhazal T(2024)Unveiling the Landscape of Machine Learning and Deep Learning Methodologies in Network Security: A Comprehensive Literature Review2024 2nd International Conference on Cyber Resilience (ICCR)10.1109/ICCR61006.2024.10533066(1-7)Online publication date: 26-Feb-2024
- Show More Cited By