1 code implementation • 6 Jun 2019 • Markus Hanselmann, Thilo Strauss, Katharina Dormann, Holger Ulmer
For reproducibility of the method, our synthetic data is publicly available.
Intrusion Detection