Keyphrases
Access Network
16%
Anomalous Behavior
16%
Attention Mechanism
16%
Attention Module
16%
Attention-based
100%
Autoencoder
100%
Balanced Data
16%
Bidirectional Long Short-term Memory (BiLSTM)
100%
Bottleneck Features
16%
Cloud-based
16%
Connected Devices
16%
Connected Network
16%
Connected Services
16%
Content-based
16%
Contextual Information
16%
Convolution Neural Network
100%
Cyber Threats
16%
Cyberthreats
16%
Data Security
16%
Feature Extractor
33%
Global Interaction
16%
Insecurity
16%
IT Ecosystem
16%
Local Spatial
16%
Multi-head Self-attention Mechanism
16%
Network Features
16%
Network Intrusion Detection System
100%
Network Traces
16%
Security Monitoring
33%
Spatial Relationship
16%
State-of-the-art Techniques
16%
Temporal Interaction
16%
Third-party Access
16%
UNSW-NB15 Dataset
16%
User Diversity
16%
Zero Trust Networks
100%
Zero Trust Security
16%
Computer Science
Access Network
20%
Anomalous Behavior
20%
Attention (Machine Learning)
20%
Bidirectional Long Short-Term Memory Network
20%
Connected Device
20%
Connected Network
20%
Contextual Information
20%
Convolutional Neural Network
100%
Convolutional Neural Network
40%
Data Security
20%
Long Short-Term Memory Network
100%
Memory Structure
20%
Network Intrusion Detection System
100%
Security Monitoring
40%
Self-Attention Mechanism
20%
Spatial Relationship
20%