Applying Generative Machine Learning to Intrusion Detection: A Systematic Mapping Study and Review. Halvorsen, J., Izurieta, C., Cai, H., & Gebremedhin, A. ACM Computing Surveys (CSUR), 0(0):1–32, 2024. (impact factor: 16.6)Pdf doi bibtex 1 download @article{james24csur,
author = {James Halvorsen and Clemente Izurieta and Haipeng Cai and Assefaw Gebremedhin},
title = {Applying Generative Machine Learning to Intrusion Detection: A Systematic Mapping Study and Review},
journal = {ACM Computing Surveys (CSUR)},
doi={10.1145/3659575},
volume = {0},
number = {0},
pages = {1--32},
year = {2024},
url_pdf = {http://chapering.github.io/pubs/james24csur.pdf},
Keywords = {survey, intrusion detection, generative learning},
note = {(impact factor: 16.6)}
}
Downloads: 1
{"_id":"eu3LREzkC5TjeyDA7","bibbaseid":"halvorsen-izurieta-cai-gebremedhin-applyinggenerativemachinelearningtointrusiondetectionasystematicmappingstudyandreview-2024","author_short":["Halvorsen, J.","Izurieta, C.","Cai, H.","Gebremedhin, A."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["James"],"propositions":[],"lastnames":["Halvorsen"],"suffixes":[]},{"firstnames":["Clemente"],"propositions":[],"lastnames":["Izurieta"],"suffixes":[]},{"firstnames":["Haipeng"],"propositions":[],"lastnames":["Cai"],"suffixes":[]},{"firstnames":["Assefaw"],"propositions":[],"lastnames":["Gebremedhin"],"suffixes":[]}],"title":"Applying Generative Machine Learning to Intrusion Detection: A Systematic Mapping Study and Review","journal":"ACM Computing Surveys (CSUR)","doi":"10.1145/3659575","volume":"0","number":"0","pages":"1–32","year":"2024","url_pdf":"http://chapering.github.io/pubs/james24csur.pdf","keywords":"survey, intrusion detection, generative learning","note":"(impact factor: 16.6)","bibtex":"@article{james24csur,\r\n\tauthor = \t {James Halvorsen and Clemente Izurieta and Haipeng Cai and Assefaw Gebremedhin},\r\n\ttitle = \t {Applying Generative Machine Learning to Intrusion Detection: A Systematic Mapping Study and Review},\r\n\tjournal = {ACM Computing Surveys (CSUR)},\r\n\tdoi={10.1145/3659575},\r\n\tvolume = {0},\r\n\tnumber = {0},\r\n\tpages = {1--32},\r\n\tyear = \t {2024},\r\n\turl_pdf = {http://chapering.github.io/pubs/james24csur.pdf},\r\n\tKeywords = {survey, intrusion detection, generative learning},\r\n\tnote = {(impact factor: 16.6)}\r\n}\r\n\r\n","author_short":["Halvorsen, J.","Izurieta, C.","Cai, H.","Gebremedhin, A."],"key":"james24csur","id":"james24csur","bibbaseid":"halvorsen-izurieta-cai-gebremedhin-applyinggenerativemachinelearningtointrusiondetectionasystematicmappingstudyandreview-2024","role":"author","urls":{" pdf":"http://chapering.github.io/pubs/james24csur.pdf"},"keyword":["survey","intrusion detection","generative learning"],"metadata":{"authorlinks":{}},"downloads":1,"html":""},"bibtype":"article","biburl":"chapering.github.io/pubs/hcaipub.bib","dataSources":["NvyxbNNBAfbe3z6oi"],"keywords":["survey","intrusion detection","generative learning"],"search_terms":["applying","generative","machine","learning","intrusion","detection","systematic","mapping","study","review","halvorsen","izurieta","cai","gebremedhin"],"title":"Applying Generative Machine Learning to Intrusion Detection: A Systematic Mapping Study and Review","year":2024,"downloads":1}