Network intrusion detection using deep learning: a feature learning approach
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore
Springer
[2018]
|
Schriftenreihe: | SpringerBriefs on cyber security systems and networks
|
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FHR01 FKE01 FLA01 FRO01 FWS01 FWS02 HTW01 UBG01 UBM01 UBR01 UBT01 UBW01 UBY01 UER01 UPA01 Volltext |
Beschreibung: | 1 Online-Ressource (XVII, 79 Seiten, 30 illus., 11 illus. in color) |
ISBN: | 9789811314445 |
ISSN: | 2522-5561 |
DOI: | 10.1007/978-981-13-1444-5 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045275231 | ||
003 | DE-604 | ||
005 | 20190520 | ||
007 | cr|uuu---uuuuu | ||
008 | 181107s2018 |||| o||u| ||||||eng d | ||
020 | |a 9789811314445 |c Online |9 978-981-131-444-5 | ||
024 | 7 | |a 10.1007/978-981-13-1444-5 |2 doi | |
035 | |a (ZDB-2-SCS)9789811314445 | ||
035 | |a (OCoLC)1066058934 | ||
035 | |a (DE-599)BVBBV045275231 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-860 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-863 |a DE-20 |a DE-862 |a DE-92 |a DE-573 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Kim, Kwangjo |e Verfasser |4 aut | |
245 | 1 | 0 | |a Network intrusion detection using deep learning |b a feature learning approach |c Kwangjo Kim, Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja |
264 | 1 | |a Singapore |b Springer |c [2018] | |
300 | |a 1 Online-Ressource (XVII, 79 Seiten, 30 illus., 11 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a SpringerBriefs on cyber security systems and networks |x 2522-5561 | |
650 | 4 | |a Security | |
650 | 4 | |a Artificial Intelligence (incl. Robotics) | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Wireless and Mobile Communication | |
650 | 4 | |a Big Data | |
650 | 4 | |a Data Mining and Knowledge Discovery | |
650 | 4 | |a Data protection | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Wireless communication systems | |
650 | 4 | |a Mobile communication systems | |
650 | 4 | |a Big data | |
650 | 4 | |a Data mining | |
700 | 1 | |a Aminanto, Muhamad Erza |e Verfasser |4 aut | |
700 | 1 | |a Tanuwidjaja, Harry Chandra |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-131-443-8 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-131-445-2 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-981-13-1444-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2018 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-030662917 | ||
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l FHR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l FWS01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l FWS02 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l HTW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l UBY01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-13-1444-5 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 706734 |
---|---|
_version_ | 1806185552073981952 |
any_adam_object | |
author | Kim, Kwangjo Aminanto, Muhamad Erza Tanuwidjaja, Harry Chandra |
author_facet | Kim, Kwangjo Aminanto, Muhamad Erza Tanuwidjaja, Harry Chandra |
author_role | aut aut aut |
author_sort | Kim, Kwangjo |
author_variant | k k kk m e a me mea h c t hc hct |
building | Verbundindex |
bvnumber | BV045275231 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)9789811314445 (OCoLC)1066058934 (DE-599)BVBBV045275231 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-981-13-1444-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03966nmm a2200769zc 4500</leader><controlfield tag="001">BV045275231</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190520 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181107s2018 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789811314445</subfield><subfield code="c">Online</subfield><subfield code="9">978-981-131-444-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-13-1444-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9789811314445</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1066058934</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045275231</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kim, Kwangjo</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network intrusion detection using deep learning</subfield><subfield code="b">a feature learning approach</subfield><subfield code="c">Kwangjo Kim, Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVII, 79 Seiten, 30 illus., 11 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs on cyber security systems and networks</subfield><subfield code="x">2522-5561</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence (incl. Robotics)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless and Mobile Communication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Big Data</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Mining and Knowledge Discovery</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Big data</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aminanto, Muhamad Erza</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tanuwidjaja, Harry Chandra</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-131-443-8</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-131-445-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2018</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030662917</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-13-1444-5</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045275231 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T13:46:11Z |
institution | BVB |
isbn | 9789811314445 |
issn | 2522-5561 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030662917 |
oclc_num | 1066058934 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-860 DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 |
owner_facet | DE-355 DE-BY-UBR DE-860 DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 |
physical | 1 Online-Ressource (XVII, 79 Seiten, 30 illus., 11 illus. in color) |
psigel | ZDB-2-SCS ZDB-2-SCS_2018 |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Springer |
record_format | marc |
series2 | SpringerBriefs on cyber security systems and networks |
spellingShingle | Kim, Kwangjo Aminanto, Muhamad Erza Tanuwidjaja, Harry Chandra Network intrusion detection using deep learning a feature learning approach Security Artificial Intelligence (incl. Robotics) Systems and Data Security Wireless and Mobile Communication Big Data Data Mining and Knowledge Discovery Data protection Artificial intelligence Wireless communication systems Mobile communication systems Big data Data mining |
title | Network intrusion detection using deep learning a feature learning approach |
title_auth | Network intrusion detection using deep learning a feature learning approach |
title_exact_search | Network intrusion detection using deep learning a feature learning approach |
title_full | Network intrusion detection using deep learning a feature learning approach Kwangjo Kim, Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja |
title_fullStr | Network intrusion detection using deep learning a feature learning approach Kwangjo Kim, Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja |
title_full_unstemmed | Network intrusion detection using deep learning a feature learning approach Kwangjo Kim, Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja |
title_short | Network intrusion detection using deep learning |
title_sort | network intrusion detection using deep learning a feature learning approach |
title_sub | a feature learning approach |
topic | Security Artificial Intelligence (incl. Robotics) Systems and Data Security Wireless and Mobile Communication Big Data Data Mining and Knowledge Discovery Data protection Artificial intelligence Wireless communication systems Mobile communication systems Big data Data mining |
topic_facet | Security Artificial Intelligence (incl. Robotics) Systems and Data Security Wireless and Mobile Communication Big Data Data Mining and Knowledge Discovery Data protection Artificial intelligence Wireless communication systems Mobile communication systems Big data Data mining |
url | https://doi.org/10.1007/978-981-13-1444-5 |
work_keys_str_mv | AT kimkwangjo networkintrusiondetectionusingdeeplearningafeaturelearningapproach AT aminantomuhamaderza networkintrusiondetectionusingdeeplearningafeaturelearningapproach AT tanuwidjajaharrychandra networkintrusiondetectionusingdeeplearningafeaturelearningapproach |