no code implementations • ICSTW 2022 • Tanwir Ahmad, Dragos Truscan, Juri Vain, Ivan Porres
We have empirically evaluated our approach on the CICIDS2017 dataset.
feature selection Network Intrusion Detection